Safe Digital Behavior
- Always lock your computer when you leave it unattended.
- Use strong passwords and enable two-factor authentication wherever possible.
- Keep software and operating systems up to date – security updates close known vulnerabilities.
- Store IT equipment containing DTU data securely – even when traveling. For example, laptops or USB drives.
- Only use approved data. Data from unknown sources may contain viruses or malware.
- Keep your access card and keys safe.
The easiest way for a malicious actor to gain unauthorized access to data or systems is often through a compromised password. That is why strong passwords are a key part of DTU’s defense.
- No one but you should know your password.
- Your password must be complex and long.
It should be at least 12 characters long and include uppercase and lowercase letters, special characters, and numbers. - Do not reuse your passwords.
Avoid using the same password across different systems. That way, only one access point is compromised if the password is exposed. Create a system to help you remember your password. For example, take a colleague’s name and use each letter as the first letter of another word. E.g., Jette = JennaEnjoysTulipsToolsEverywhere. Make it harder with special characters: Jenna3njoysTulips&Tools-Everywhere - Be aware of fake login pages that mimic familiar services.
If you suspect you’ve entered your password on a fake login page, change your password immediately and report an IT security incident.
If you are unsure whether an email is fake, do not open attachments or click on links.
If you accidentally click a suspicious link or enter your password, change your DTU account password immediately, report an IT security incident, and report the email directly in Outlook.
Be cautious if:
- You receive a request for urgent help under suspicious circumstances, e.g., the person claims to be traveling and unreachable by phone.
- There are discrepancies between the link and the website it leads to.
- You are asked to enter sensitive information, click a link or attachment, or download unknown software.
- The email address does not match the sender’s name.
If in doubt, contact the sender through other channels (phone, Teams, etc.) or try to verify the sender’s identity and credibility in another way.