IT Security: Good tips

it-sikkerhed gode råd

IT Security: Good Tip #1

Safe Passwords

A safe password is important when it comes to good IT Security.

A password must consist of:

  • Both lower-case and under-case letters
  • Numbers
  • Symbols

A strong password: 

  • should be long – the longer the password, the stronger is it
  • should be unique – avoid using obvious words, sentences or patterns 
  • should not contain personal information – it can be easy for others to guess
  • should not be reused – do not use the same password multiple places 
Did You Know?
In 2017, 90 people from the British Parliament got their e-mail accounts containing confidential documents hacked because of easy passwords. 

IT Security: Good tip #2

Beware of Public Networks

Public networks can easily get hacked and you should generally consider all public, wireless or wired networks as unsafe. 

If hackers gain access to public networks and you connect to it, it is easy for them to intercept you and your workplace’s confidential information. 

If you need to access the internet on-the-go, it is important that you ensure yourself against hackers gaining access by: 

  • using a VPN connection
  • using a mobile hotspot or the internet sharing function from your phone
You can find information about cyber threats on the Center for Cyber Security’s website.
Did You Know?

A journalist used the public wireless network in an airplane to send and read messages regarding upcoming articles. After the plane journey, another passenger thanked the journalist for the good reading, as he had gained access to her messages with a little technical ingenuity. 

Do Not Respond to False Emails

Phishing emails are false emails where scammers attempt to trick you out of confidential information or make you click on infected links. 

The typical signs of phishing emails:  

  1. The email encourages quick action to make you make rash decisions. 
  2. The email contains a prize or offer, that is too good to be true. 
  3. The sender will often imitate a legitimate email address from a trustworthy sender but will deviate slightly from the correct address. 
  4. The email will attempt getting you to click on a link or open an attached file. 
  5. The email will ask you to type in sensitive or confidential information, e.g. passwords or credit card information. 
  6. The text is poorly worded and contains spelling mistakes. 

IT Security: Good Tip #3

Protect Sensitive and Confidential Information

If you work with sensitive or confidential information, it is important that you protect it. 

This both applies at and outside of your workplace: 

  • Remember to always log out of or lock your computer when leaving it. 
  • Always save documents to secure drives located on your workplace’s central network server. 
  • Pick up your printed documents immediately after. 
  • Do not leave documents on your desk – lock them away in a drawer or cupboard instead. 
  • Make sure to dispose of documents safely when they are no longer needed, e.g. by shredding them. 
  • Encrypt the information if you work on mobile devices. 
  • Beware of shoulder-surfing, e.g use a screen filter. 
  • Do not talk loudly about sensitive or confidential information in front of people who should not know the information. 

You can read more about IT security on

Did You Know?

IT security awareness training can help create a better IT security culture. Read more about the e-learning and how it creates value here on this site.

Leave a Reply

You must be logged in to post a comment.