Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Content Layer
background-color$lightGrayColor
padding40px
id1303288309
Content Column
columnalternate
width35%
id1303288310
Content Block
id1303288332

Info

Action Button
new-windowtrue
width100%
textFor new employee
titleHere you can find...
urlhttps://wiki.ut.ee/display/AA/For+new+employee

Action Button
new-windowtrue
width100%
textFor new student
titleHer you can find...
urlhttps://wiki.ut.ee/display/AA/For+new+student

Action Button
new-windowtrue
width100%
textInformation about cybersecurity
titleHere you can find...
urlhttps://wiki.ut.ee/display/AA/Guidelines+on+cybersecurity

Content Column
width65.0%
id1303288321
Content Block
id1303288342

Popular topics

IT helpdesk most read computer help guides in the past month
  1. E-post
  2. VPN
  3. Eduroam
  4. GlobalProtect VPN connection (Windows)
  5. Install Microsoft Office 365

  6. Zoom
  7. Activate two-factor authentication in Microsoft 365
  8. OpenVPN connection (Windows)
  9. Entering UT information systems
  10. Zoom
  11. Grammarly setup
  12. FAQ - UT e-mail for students

  13. Data protection guidelines

    UT information system applications

Content Layer
id1303656169
Content Column
width100%
id1303656170
Content Block
id1303656180

News


HTML Link
new-windowtrue
textCheck your information security knowledge
urlhttps://wiki.ut.ee/display/AA/Check+your+information+security+knowledge

Joonas Masing 14.03.23

We invite all employees of the University of Tartu to check their information security knowledge with cyber hygiene tests in the online environment. The aim of the tests is to highlight the main risks of everyday computer use through real-life examples and...

HTML Link
new-windowtrue
textDigital cleanup guidelines
urlhttps://wiki.ut.ee/pages/viewpage.action?pageId=115868106

Imre Lall 05.02.23

Digital junk is the stuff that unknowingly but surely accumulates on our computers. Over time, various useless programs, documents and many other unwanted things appear in the machine. Therefore, using the computer becomes more cumbersome and...

HTML Link
new-windowtrue
textData phishing
urlhttps://wiki.ut.ee/display/AA/Data+phishing

Margo Mõis 25.11.22

Phishing is a fraud scheme aimed at extracting access data, passwords, credit card numbers and other sensitive information from computer users. In general, phishing attempts by scammers reach users…