Jump to content
Home
To personer går rundt i et atrium.

Information Security for Employees

Are you an employee at Aalborg University and do you have questions about information security? Then you have come to the right place! On this page, you will find a variety of resources about information security at AAU and how you, as an employee, can best handle it. You can also select your specific role as a teacher, researcher or administrative employee to find more relevant information.

To personer går rundt i et atrium.

Learn more about information security as...

What is expected of me?

As an employee, you process information on behalf of Aalborg University. AAU has plenty of security measures in place, but the first, and biggest, step towards securing your data is for you to take. In short, this means that you are responsible for ensuring that information is processed, stored and shared in a responsible and secure manner - using the guidelines you will find on this page.

Are you a system owner or manager?

Find out what your responsibilities are
If you are either a system owner or system manager at AAU, there are a number of information security aspects you need to consider.
System Owner
For each business-critical IT system, a system owner has been appointed who is responsible for ensuring information security when using the system. Is this you? Then you can find out more about your responsibilities below.
The role of the system owner in the organisationUser registrationEquipment maintenanceDiagnostic port protectionChange managementSoftware updatesRemote management authorisationProtection of system documentationGood Practice
System Manager
System managers support the tasks of system owners, but with a more hands-on approach. If you as a system manager assess that there are potential security challenges, vulnerabilities and/or anomalies, you should contact the system owner or IT Support.
Equipment maintenanceGood Practice

Data Classifica... What?

Not sure what type your data is? Do you know how to store it correctly? And do you share it with others in a secure way? Read more about how to classify your information so it's handled correctly.

To personer arbejder sammen om en computer og en notesbog.
Read more about data classification here

Data Classifica... What?

Not sure what type your data is? Do you know how to store it correctly? And do you share it with others in a secure way? Read more about how to classify your information so it's handled correctly.

Read more about data classification here
To personer arbejder sammen om en computer og en notesbog.

Generative AI and Security

Generative AI tools are everywhere - here you can read more about how generative AI and security interact. You can also learn more about some of the most common AI products and what kind of data you can use with them.

Read more about generative AI and security

7 tips to keep your information secure

  1. 1

    Avoid taking the bait

    One of the most common hacker attacks is phishing. People with the intention of stealing your information send you messages that on the surface look like the real thing. Therefore, it's a good idea to be sceptical when MitID, Føtex and foreign princes want you to click on their links.

  2. 2

    Store your files on AAU-approved platforms

    AAU has a number of approved platforms that you can safely use when working with and storing data. You can find an overview of these here.

  3. 3

    Protect your passwords

    You've probably heard it a thousand times before, but try as much as possible not to reuse the same password over and over again for all your logins. Your passwords are also more secure if you don't include your name and birthday. You can read more about passwords at AAU here.

  4. 4

    Be wary of using free networks

    When you connect to a free wireless network, for example in cafés or at the airport, you rarely know who might be watching on the other end. Free networks may be free to join, but it can be costly for you if someone with malicious intent steals your information.

  5. 5

    Avoid public computers

    Libraries and hotels often provide computers with internet access. These machines may contain malware or keyloggers that can, for example, collect the passwords you enter. Avoid accessing confidential and sensitive information on a borrowed computer. And always remember to log off.

  6. 6

    Turn off Bluetooth and Airdrop

    By turning off Bluetooth and Airdrop when you're not using it, you can prevent others from logging into your network or viewing your files.

  7. 7

    Keep yourself updated

    One of the best things you can do for your digital security is to keep your devices and yourself up to date. New updates for your devices often patch old security holes - and you can patch the gaps in your information security knowledge by clicking around this website.

Person står med en mobiltelefon.

Report a Security Incident

Want to report a security incident? Or are you curious about what a security incident actually is? As an employee or student at AAU, you must report security incidents as soon as you experience them.

Person står med en mobiltelefon.
Visit the page for security incidents
Hånd placerer et mini-hus på model over boligkvarter.

Security Rules and Policies

Do you want to dive into the different rules and policies that have been developed in the field of information security?

Hånd placerer et mini-hus på model over boligkvarter.
Find AAU's security rules and policies here

Risk Management

What on earth is risk management? Why, when and how should it be done? You'll find all the information here.

Read more about risk management

Risk Management

What on earth is risk management? Why, when and how should it be done? You'll find all the information here.

Read more about risk management
To personer i kitler står sammen og kigger på en brochure.

Frequently Asked Questions (FAQ)

Do you have a question that you haven't found the answer to yet? Then you might be lucky that others have asked the same question before. On this page you will find the most frequently asked questions about information security at Aalborg University.

To personer i kitler står sammen og kigger på en brochure.
Find frequently asked questions (FAQ)