The Golden Rules of IT Se­cur­ity

Keep soft­ware con­sist­ently up to date

Ensure that operating systems, applications and security tools are kept up to date, as updates close critical vulnerabilities and provide essential protection against attacks.

Keep your browser up to date and con­fig­ure it se­curely

Update your browser regularly and review its security and privacy settings to minimize potential risks.

Use an­ti­vir­us soft­ware and a fire­wall re­li­ably

Ensure that an up‑to‑date antivirus solution and an active firewall are installed to effectively prevent malware and unauthorized access.

Ap­ply ad­min­is­trat­ive rights only when ne­ces­sary

Use administrative privileges only when strictly required in order to reduce unintended system changes and security risks.

Ex­am­ine emails care­fully

Open emails and attachments only when sender, subject and content appear plausible; in case of doubt, it is advisable to verify authenticity beforehand.

Scan QR codes with par­tic­u­lar cau­tion

Verify the source of QR codes and check the displayed destination address to avoid fraudulent redirects or malicious content.

Ob­tain soft­ware strictly from trust­worthy sources

Install applications solely from verified sources and open only those files whose origin you can clearly confirm.

Use strong pass­words

Use complex, unique passwords and store them exclusively in a trusted password manager.

En­able two‑­factor au­then­tic­a­tion

Activate two‑factor authentication wherever it is offered to ensure that your accounts remain protected, even if passwords are compromised.

Pro­tect con­fid­en­tial in­form­a­tion and se­cure your devices

Never share sensitive information with unauthorized individuals and always lock your device when leaving your workspace.

Store sens­it­ive data se­curely

Protect confidential information through appropriate encryption and keep keys as well as devices stored safely.

Per­form reg­u­lar data backups

Back up important data at regular intervals, particularly on mobile devices or in cloud environments, to remain operational in the event of data loss.

Use cloud ser­vices re­spons­ibly and se­curely

Protect access to cloud services using strong passwords and 2FA, and share only the data that is strictly necessary.

Use a VPN in pub­lic net­works

Use a VPN when working in public or unsecured WLAN networks to encrypt your communication and securely access sensitive information.