Skip to main content
To KTH's start page To KTH's start page

Work securely with IT at KTH

On this page, you will find tips and recommendations for working in a safe computer environment at KTH, both when you work locally on site, or from another location remotely.

It is important as a user at KTH to protect your computer and your data/information.

In addition to the already implemented security solutions in the KTH platform computer, we would like to recommend these security tips to work safely. If you are unsure whether a security solution is already implemented on your platform computer or not, please Contact KTH IT-Support .

Basic security tips for IT at KTH

How to make your password more secure

  • The password should have at least 12 characters that contains at least one capital letter, one special character like ("¤)% and finally the password shall NOT contain word or sentences from dictionaries. 
  • Never use the same password on different places. For example, one shall not have the same password on your private e-mail, as on your KTH account.
  • Never use the same password twice.
  • Change your password from time to time.
  • Never share your password to somebody.

Keeping your computer up to date

Note!! If you work remotely on a KTH platform computer, you need to be connected to the VPN in order for the computer to be updated. More on how to connect to VPN at KTH .

  • Keep your system updated by manually update it or use automatic system updates.
  • Update your apps and softwares periodically.
  • Reboot your computer periodically so that the updates will be installed.


  • Always check that the e-mail you have received agrees with the person or organization you think sent it. For example, you get an e-mail from that asks for your password, but the reply e-mail address is to <> instead of
  • Despite the fact that we work internally all the time with preventive measures to stop malicious e-mail, it unfortunately happens from time to time that it reaches recipients anyway. Read more on Malicious E-mail  about how to deal with these types of e-mails, when you are receiving them.

Links and files

  • Be careful on what links you click on or what files you save or open. The criteria are that you should not open any e-mail, click on links or open files that comes from unknown persons or organizations.

Wireless networks

  • Only connect to well known and safe wireless networks. Eduroam networks are preferable and is available on many locations around the world as for example on universities, airports, and railway stations.
  • If you are unsecure that you are using a safe network, use VPN at KTH when you connect to services at KTH.

Protect your devices

  • Use a password on all your devices and make sure to lock them when you are temporary leaving them out of sight.
  • Use automatic password protection that activates after x number of minutes.
  • If possible, encrypt your hard drive so that if you lose your computer, the data will be protected.
  • Keep your data safe with backup and/or cloud storage like KTH OneDrive or similar KTH service (non-approved by KTH services should not be used).
  • If you borrow or lend a device, be sure to use private/incognito windows in the browser so that any logins and browsing history are not saved.

Report suspicious activity

  • If you suspect that someone knows your password or if someone had undesirable access to your computer or device, you should change your password immediately and Contact KTH IT-Support  as soon as possible.