Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
en:services:it_security:other_topics:current_situation [2019/12/20 12:56]
totto
en:services:it_security:other_topics:current_situation [2019/12/20 13:53]
totto
Line 8: Line 8:
  
 IT security measures have been introduced for the IT systems maintained by the IT service providers on the Göttingen campus to avert danger, including filter and control measures for potentially dangerous email attachments. As a user of our systems, please help to improve information security at the Göttingen Campus! IT security measures have been introduced for the IT systems maintained by the IT service providers on the Göttingen campus to avert danger, including filter and control measures for potentially dangerous email attachments. As a user of our systems, please help to improve information security at the Göttingen Campus!
 +
 +In particular, we ask you to apply the following general IT security guidelines:
  
 <WRAP center round important 100%> <WRAP center round important 100%>
  
 \\ \\
-In particular, we ask you to apply the following general IT security guidelines: 
  
   * Email attachments should not be opened without caution. Check questionable attachments especially thoroughly, e.g. by asking the sender. If in doubt, refrain from opening such attachments on your work computer. This applies in particular to attachments from private email accounts or addresses.   * Email attachments should not be opened without caution. Check questionable attachments especially thoroughly, e.g. by asking the sender. If in doubt, refrain from opening such attachments on your work computer. This applies in particular to attachments from private email accounts or addresses.