Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:services:it_security:other_topics:current_situation [2019/12/20 12:46]
totto
en:services:it_security:other_topics:current_situation [2019/12/20 13:53]
totto
Line 8: Line 8:
  
 IT security measures have been introduced for the IT systems maintained by the IT service providers on the Göttingen campus to avert danger, including filter and control measures for potentially dangerous email attachments. As a user of our systems, please help to improve information security at the Göttingen Campus! IT security measures have been introduced for the IT systems maintained by the IT service providers on the Göttingen campus to avert danger, including filter and control measures for potentially dangerous email attachments. As a user of our systems, please help to improve information security at the Göttingen Campus!
 +
 +In particular, we ask you to apply the following general IT security guidelines:
  
 <WRAP center round important 100%> <WRAP center round important 100%>
  
 \\ \\
-In particular, we ask you to apply the following general IT security guidelines: 
  
   * Email attachments should not be opened without caution. Check questionable attachments especially thoroughly, e.g. by asking the sender. If in doubt, refrain from opening such attachments on your work computer. This applies in particular to attachments from private email accounts or addresses.   * Email attachments should not be opened without caution. Check questionable attachments especially thoroughly, e.g. by asking the sender. If in doubt, refrain from opening such attachments on your work computer. This applies in particular to attachments from private email accounts or addresses.
Line 28: Line 29:
   * Do not work regularly with administrative user IDs. This applies in particular to surfing the Internet and reading emails.   * Do not work regularly with administrative user IDs. This applies in particular to surfing the Internet and reading emails.
  
-  * Do not activate macros in Microsoft Office documents (Message "​Activate contents",​ exception: official documents of the University/​UMG/​GWDG,​ which are provided in university/UMG/GWDG intranets).+  * Do not activate macros in Microsoft Office documents (Message "​Activate contents",​ exception: official documents of the University/​UMG/​GWDG,​ which are provided in University/UMG/GWDG intranets).
  
 </​WRAP>​ </​WRAP>​