Security is in your hands

Virtually all areas of life today are marked by computer science. This makes many activities easier for us, but it also harbours dangers. With your correct behaviour you make an important contribution to the security of data and infrastructure. Astronaut "Cybie" and his Trabant "Digi", the stars of the new awareness campaign for IT security in the Federal Administration, will give you helpful tips.

 

Click!

Think before you click!

Clicking risks: Improve and test your knowledge

What is ransomware? How does a drive-by infection work? What is CEO fraud? Our "Malware 101" provides answers to these questions, as well as much more information about malware and the methods used by fraudsters in cyberspace.

"Malware 101" 

 
 

Beware of emails

Bogus emails come in many different forms. Some are recognisable as spam at first glance; others are cleverly designed and can be detected as fake messages only on closer inspection. Examples include:

 

  • Phishing emails: emails with a fake sender and fake content use a fake logo of a well-known company or bank to pretend to need information from the recipient. A link sent with the email leads to the fraudsters' website, where this information is then requested.

  • Viruses, Trojans, worms: email attachments that look like normal Word, PDF or other files can contain malware that installs itself on your computer when you click on the attachment. The malware then causes damage to the computer (e.g. data theft, deletion of data, damage to the operating system so it can no longer be used, etc.).

  • Ransomware: this is a specific form of malware which encrypts a computer's hard disk. Cybercriminals then try to extort ransom money for decrypting the hard disk.

How do I recognise dangerous emails? 

Caution is advised when...

  • ... the sender is completely unknown or the origin of the email cannot be identified.
  • ... you are not addressed personally or you are addressed incorrectly.
  • ... the email is written in bad English or in a foreign language.
  • ... you are offered money, gifts, unknown deliveries, sex contacts, etc., or a prize is promised.
  • ... you are put under pressure.
  • ... you are asked for personal information such as passwords, login data, etc.

If an email appears suspicious

  • Check the sender's address very carefully.
  • Immediately delete suspicious emails permanently (Shift+Delete keys).
  • Do not click on any links sent with the email and do not open any email attachments.
  • Check links by moving your mouse over them to view the actual link, but be careful not to click on it.
  • Never divulge personal information/passwords.

Acting correctly:

 
 

Remark:

The ICT Security campaign is aimed at employees of the Federal Administration. Of course, a lot of information and tips also apply to users outside the Federal Administration. 

Last modification 21.01.2020

Top of page