Study securely with IT
What can you do to work in a safe and secure way with the IT tools you use?
Passwords
Length of passwords over complexity
A password that consists of 8 randomly selected characters is never as strong as a collection of multiple words that add 12 - 20 characters. Preferably choose a set of memorable words or a sentence that you can connect in your mind.
Do not reuse passwords
It is tempting to reuse a password. It makes it easy for you to remember it on all your different accounts, but it leaves you wide open if someone manages to break your password on one page. You run the risk of intruders gaining access to all your services where you use the same password.
Change your password if an IT service or website has had a leak
If an IT service or website notifies you that your account may have been compromised in the event of a leak, change your password immediately.
Use a password manager
Even the most memorable passwords become a problem if you need to remember more than a small handful of them. With a password manager, each of these IT supports and websites has a unique password.
You only need to remember the password for your password manager and your primary password to be able to log in to my devices using your password manager.
If possible, always enable multi-factor authentication.
With multi-factor authentication apps, such as Microsoft Authenticator, Okta or via text / SMS, a unique code and your password must be entered to log in. Always select the app version over the SMS-based two-factor authentication.
Keep your devices up to date
Both operating systems and other software need to be kept as secure as possible. New security flaws in operating systems and software are constantly appearing, and it is important to try to keep up. The first line of defence against intrusion is a modern operating environment that is continuously updated.
Continuously installing fixes against known security holes reduces the risk of attacks, which lessens the risk of you losing your information or getting viruses on your device.
Email or text message-fraud
Scammers have for a long time tried to steal from us private information such as passwords, credit card numbers, codes and login details. It is common for this to take place via e-mail or via web forms on the Internet, so-called phishing.
Both the e-mail and the web forms often look authentic, with, for example, the university's logo, targeted information and senders such as Administrator, Helpdesk or well-known companies.
Information that fraudsters obtain is misused in various ways, which can cause a lot of damage both to you as a person and to the university.
Warning signs
- Questions about personal information - your username, password, codes, credit card number. A real IT department, bank or the like never asks you to fill in a password, account number or the like in e-mails or forms on the web.
- Announcement of lottery winnings, rewards, very low special prize or other personal benefit for you - If it sounds too good to be true, it is very likely a phishing attempt.
- Your package is on the way - That online shopping has increased the amount of packages we're waiting for is something scammers take advantage of. Do not click on links in an e-mail och text message and check any tracking id against the delivery company's website.
- Threats with negative consequences. " Your account will be deleted if you do not immediately... "
- Links in email, social media or chat. Phishing links often go to completely different places than they seem to do. Be aware of the risks before clicking on a link!
Protect yourself
- Be aware that phishing attempts often look genuine.
- Do not reply - Report received email as "phishing" in the email client (webmail)
- Do not enter your personal information in web forms opened via email links, social media or chat programs.
Updated: