Skip to main content

Quick guide to information security

Tampere University and TAMK

Quick guide to working securely

  1. Keep your username and password safe. You are responsible for all activity that occurs under your user account and have an obligation to protect your own data and that of others. Never reveal your password to anyone. If you know or suspect that your password has been compromised, change your password immediately or ask the IT Helpdesk to change it for you.  
  2. Select a password that is complex and difficult to guess while easy for you to remember. Use different, secure passwords for the IT systems of Tampere Universities and external systems.
  3. Use caution when opening an email from an unknown sender. Fraudulent emails may contain malware or take you to a website that infects your computer with malware.
  4. Be wary of phishing emails that try to entice you into disclosing your username and password or entering them on a fake website. Our administrators will never ask you for your password.
  5. Always check the URL before clicking a link. Be especially careful with links that you receive by email. Learn how to separate fraudulent URLs from authentic ones. If you suspect the authenticity of a link sent on behalf of TUNI, log in to the website or first to find a link to the system and type the URL into the address bar of your browser. 
  6. Before accepting any terms of service, check at least that you retain ownership of your data and your data will not be shared with any third parties. 
    Be careful of what you post online (Facebook, photo sharing services, etc.)
  7. Social media and online services can be used to spread malware. Use caution when clicking on pop-ups, ads and invitations.
  8. Make sure your computer is protected with a firewall, anti-malware software and software upgrades and back up your data. You should also protect your smartphone and mobile devices, for example, with a passcode. Only install apps and software that you need on your computer and mobile device.
  9. You should preferably use other storage media than USB drives, which are easy to break and are not secure enough to be used as the primary or only storage location for your files. Never store sensitive information on an unencrypted USB drive.
  10. Report suspected data breaches and system misuse to the IT Helpdesk.

Please also note the following instructions if you are a staff member:

  1. You should use employer-issued devices for work-related purposes.
  2. Make sure that your mailbox is monitored in your absence. If necessary, set up automatic out-of-office replies when you are on holiday.
  3. Outgoing employees must agree with their supervisor about handing over necessary work-related materials before leaving.

See also Secure remote work

IT Helpdesk
0294 520 500
it-helpdesk [at] (it-helpdesk[at]tuni[dot]fi)

Published: 1.2.2019
Updated: 12.10.2022