Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

New Certification Authority: From Sectigo to Harica

April 4th, 2025 | by
Clipboard with paper on which several boxes are ticked off

Source: Own illustration

The time has come! Since April 1, 2025, user certificates (S/MIME) can again be requested in the RA-Portal. After our previous certificate provider, Sectigo, terminated its contract on January 10, 2025, we now have a new provider. The German Research Network (DFN) and GÉANT have contracted a new provider for public-key certificates. The choice fell on the Greek trusted provider HARICA (Hellenic Academic & Research Institutions Certification Authority). HARICA is a certification authority of the Greek university network GUnet, is specially optimized for research institutions and meets the highest security standards.

 

Read the rest of this entry »

+6

Effective Backup Strategies: Correct Data Backup

March 31st, 2025 | by

Source: Freepik

Backing up important professional or private files, such as texts, images and other documents, is essential. Data loss can have catastrophic consequences, whether caused by technical mishaps, accidental deletion or even hardware theft. Data loss can also be caused by viruses or hacker attacks. Viruses can, for example, encrypt the hard drive and then demand a ransom. Here are some proven strategies and tools to ensure that your data always remains safe and accessible. You can also take a look at the category IT-Security on our website to find out more tips.

Read the rest of this entry »

+6

IT Security When Traveling

March 28th, 2025 | by
Young man sitting on two suitcases, viewing travel destinations on his laptop

Source: Freepik

Those who frequently use public transportation are often reminded to take care of their personal belongings. The material damage caused by theft or loss is obvious. The dangers of data theft are perhaps less apparent but have equally serious consequences. These consequences include identity theft, unauthorized access to financial data and potential damage to your personal and professional reputation.

With the right IT security tips, you can reliably protect your data on the move and travel with peace of mind. In this blog post, you can find out how to protect your data effectively – whilst enjoying every trip in peace.

 

Read the rest of this entry »

+7

The ITSSM Department in Focus: IT Services & IT Security

March 24th, 2025 | by
View of the building at Seffenterweg 23

Source: Alexander Müller

The IT Service & Security Management (ITSSM) department plays a key role in the establishment, control and further development of IT service management processes and security processes in the IT center. The processes support service provision, service operations, IT security, reporting and support. In the following blog post, we take a closer look at the department’s areas of work.

Read the rest of this entry »

+8

Blockchain Technology

March 19th, 2025 | by
Blockchain background with isometrical forms

Source: Freepik

Blockchain technology, often referred to simply as ‘blockchain’, is transforming the way data is stored and secured. Originally developed as the basis for cryptocurrencies such as Bitcoin, it has quickly developed into a versatile technology that is used in numerous industries.

In this blog post, you can find out how it all works and what applications there are in general.

 

Read the rest of this entry »

+3

Digital Cleanup Day 2025

March 12th, 2025 | by
Graphic of a hand wiping over an orange background with the words Digital Cleanup Day

Source: Own illustration

The temperatures are rising and the first flowers are sprouting from the ground. That can only mean one thing: spring is here. And that means it’s time for the annual spring cleaning. But don’t just clean and declutter your home, do the same for your digital devices. Digital Cleanup Day on March 15 is a reminder to do a digital spring cleaning too.

 

 

Read the rest of this entry »

+12

DataStorage.nrw – How Do You Find out When Your Research Data Will Be Migrated?

March 5th, 2025 | by

Preparations for the DataStorage.nrw connection are currently in full swing. Until the wait is over, we would like to prepare you for what the migration will look like for you on the Coscine platform. This way you can see at a glance whether your research data is currently being migrated.

Read the rest of this entry »

+3

Which Browser Is the Most Secure?

February 12th, 2025 | by

To mark Safer Internet Day, we want to raise awareness of online safety and help you to better protect your digital environment. In an increasingly digitalized world where online security is becoming more and more important, choosing the right browser is a crucial step in protecting yourself from cybercrime and unwanted access. But which browser is the most secure? In this article, we have done some research and provide you with an overview of the most popular browsers and their security features. You can also read our previous article to find out more about internet security.

Read the rest of this entry »

+8

European Data Privacy Day 2025

January 29th, 2025 | by
Lock and security icons with laptop in the middle

Source: Freepik

Every year on January 28 is European Data Privacy Day – a date that reminds us of the importance of protecting our personal data and privacy in the digital world. We at the IT Center take this day as an opportunity to draw attention to key aspects of data protection.  We already emphasised the importance of protecting our personal data in last year’s article.

Read the rest of this entry »

+5

Between Viruses and Worms

January 24th, 2025 | by

Source: Freepik

With the advent of the Internet in our everyday lives, the risk of malware such as viruses, worms and Trojans has increased dramatically. What began in the 1980s with distribution via floppy discs and CD-ROMs now takes place almost exclusively via the Internet. Various techniques and technologies make modern malware more inconspicuous and at the same time more dangerous – from stealthy data theft to automatic distribution via botnets.

Read the rest of this entry »

+4