On joining the Federal Administration and in the course of your work, you are provided with the ICT tools you need to perform your tasks. This hardware and software has been checked and its interaction is ensured. In addition, the corresponding security measures have been implemented.
- Do not make any changes to technical settings.
- Do not use any private hardware or programs at your workstation.
- Immediately report the loss of a device to the help desk.
- Make sure that your private hardware and software are also up to date and thus optimally protected.
Further information
Why should no private hardware or programs be used at your workstation?
These can interfere with the secure operation of Federal Information Technology. There is also a risk of your device being infected with a virus or malware.
Protect your hardware and software at home
Ensure that your devices, software and data are adequately protected. The following five steps for ICT security are helpful here:
- Backup your data
- Monitoring with antivirus software and firewall
- Preventing with software updates
- Protecting online access
- Exercising care and remaining alert
Informations and tips for IT security at home can be found under:
Last modification 25.05.2023