Security is in your hands

Virtually all areas of life today are marked by computer science. This makes many activities easier for us, but it also harbours dangers. With your correct behaviour you make an important contribution to the security of data and infrastructure. Astronaut "Cybie" and his Trabant "Digi", the stars of the new awareness campaign for IT security in the Federal Administration, will give you helpful tips.

 

Mine!

My data – your data

Federal hardware and software – a safe bet

The Federal Administration will provide you with all the ICT equipment and materials required for your work when you take up your position, or at a later point in time. This includes both hardware and software. All ICT equipment and materials made available will have been checked by the Federal Administration and meet the relevant security requirements.

Do not make any changes to federal ICT resources

Federal ICT resources are configured for secure use and must not be modified by employees. Any necessary changes to settings, deinstallations and installations are carried out by parties authorised by your service provider. This is the only way to ensure that the security settings are up to date and correct. This also allows faster solutions to be found for support queries and security problems.

Do not use any private hardware or programs at your workstation

The use of private devices on your workstation carries risks and could lead to security vulnerabilities. For example, unsuitable or insufficiently secured notebooks can serve as a gateway for hackers to place malware and access data and applications. Private devices could therefore severely disrupt the secure operation of federal ICT.
Mobile device management (MDM) is a secure solution for using private smartphones (iPhones) for professional purposes, as it protects the data involved.
External storage devices such as flash drives can install malware automatically on a PC without the user being aware. Ensure that you connect only external data carriers from the Federal Administration to your work devices.

Separate professional and private data

Do not store any professional information on private data carriers.

Do not use your professional email address for private purposes

Make a distinction between private and professional emails. For this reason, professional email addresses may not be used for private purposes, for example. Equally, you should not use private email accounts for federal matters. To register with an online shop, take part in a competition or register on social media for private purposes, you must therefore use only your private email address. This is to prevent your official email address from being misused by hackers or used for spam. In addition, if you change jobs and your professional email address is deactivated, access to all private accounts that you have created with this email address will also be lost.

Use only secure private ICT resources

If private ICT resources are used for work, e.g. when working from home, they must meet the federal protection requirements. This applies to both hardware and software. Care must be taken to ensure that the systems are always kept up to date, particularly in the case of the software used. For this reason, you should regularly install software and operating system updates in order to prevent existing security vulnerabilities from being resolved either too late or not at all. And do not forget effective and up-to-date virus protection!

Acting correctly:

 
 

Remark:

The ICT Security campaign is aimed at employees of the Federal Administration. Of course, a lot of information and tips also apply to users outside the Federal Administration. 

Last modification 12.03.2020

Top of page