Basic IT rules

You should always observe the following basic rules, especially if you administer your device yourself. Devices that are administered by the URMZ receive necessary security updates and virus protection programmes automatically.


A good and reliable address for security questions is the BSI for Citizens website of the Federal Office for Information Security (BSI).

Keep your software up to date

Updates and patches are an important means of closing any security gaps. Therefore, always keep your operating system and the applications you use up to date.

Devices that are administered by the URMZ receive their updates as part of the central management. 

You can find more information on this topic at: Basic protection for computers, tablets and smartphones

Use a virus scanner

Protection programmes such as virus scanners can considerably increase security when surfing the Internet. However, no programme offers 100% protection. In addition, one should always bear in mind that a virus scanner itself can have security gaps. Pre-installed virus protection, such as Windows Security, offers basic protection for surfing the Internet. As with all software, the following therefore applies: always keep it up to date.

Virus protection is already installed on devices administered by the URMZ.

Use a firewall

Use strong passwords

Download and install only from reliable sources

If you require software for a device procured by the university or administered by the URMZ, always contact the URMZ, Software Procurement first.

Install only software from reliable sources, e.g. from the supplied data carriers or the manufacturer's website. Free software, which is offered by various platforms, can be afflicted with adware or other malware. Therefore, always obtain software from the manufacturer's website, if possible. 

Only work with necessary rights

Users of workstations administered by the URMZ work without administrative authorisation.

The effects of a successful attack by malware will be less, the lower the rights of the affected user in the operating system are designed. Therefore, it is important that you are only logged on to the IT system with the rights necessary to complete the task at hand. "Administrator rights" are only needed for administration and not for researching on the Internet or working with word.

You can find more information on this topic at:  user account


Be suspicious

IT Service Desk
Service area
(University Computer and Media Center)
Centre for Communication and Information (KIZ) / Room 0.11