IT operators

Are you thinking about your own IT structures?

Take a look at the ITS website for a suitable solution. There you will find IT systems that are maintained and meet the requirements of a university. ITS will take care of the technical measures for the IT security of these systems for you.

As an IT operator, you bear immense responsibility for the security and integrity of your organization's IT infrastructure. This includes not only protecting sensitive data from unauthorized access, but also ensuring the availability and performance of your systems.

Your tasks include regularly checking and updating security measures, carrying out backups to secure data and training your employees to make them aware of potential threats.

As an IT operator, you have a key role to play in ensuring smooth and secure operations, so it is vital to take your responsibilities seriously and always be proactive.

Here are some important points on information security for IT operators:

Ensure that all systems are regularly updated with the latest security patches and updates to close known security gaps.

Your cookie settings have blocked this video

Configure and monitor firewalls to prevent unauthorized access to the network. Also implement intrusion detection and prevention systems (IDS/IPS) for additional protection.

The IT Service Center is expanding its range of services with a tailor-made firewall solution that can be obtained from ITS. This allows you to define individual rules and settings for your IP range, while we take care of operation and maintenance so that you can concentrate fully on your core activities.

Manage user access rights and permissions carefully to ensure that only authorized users can access certain resources.

Your cookie settings have blocked this video

Implement regular data backups and develop a comprehensive plan for recovery in the event of data loss or a cyberattack.

Your cookie settings have blocked this video

Raise employee awareness of security risks and offer training on recognizing phishing attacks and other cyber threats.

Go to the training courses

Develop clear security policies and procedures for handling sensitive data, password policies, access controls, etc. Ensure that these are regularly reviewed and updated.

Implement encryption for sensitive data, both in transit and at rest, to ensure that it cannot be compromised even in the event of a successful attack.

Your cookie settings have blocked this video

Implement security policies for mobile devices such as smartphones and laptops to ensure they are adequately protected when accessing the company network.

We have prepared some information on mobile working for employees.

Ensure that your security measures comply with applicable legal regulations and industry standards, especially when processing sensitive data such as personal information.

Please report any known security incidents immediately and communicate them openly. We will work with you to minimize the damage to you and the University of Kassel.

Report a security incident

By implementing these best practices, you can improve information security in your organizations and minimize the risk of cyberattacks and data loss.