Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Computer Security Day: 5 Simple Tips to Improve IT Security

November 30th, 2022 | by
IT security symbols: cloud, magnifying glass, fingerprint, keyhole, email, cryptographic key

Source: Own Illustration

For most people, life without the Internet has long been unimaginable. Whether at home, at work or anywhere along the way – information technology is simply everywhere. However, its ubiquity also raises the question of its security. A question that experts already asked themselves back when the Internet had only just begun to develop. Since 1988, November 30 has been dedicated to IT security in many countries. The aim of this event is to raise general awareness of IT security and to educate users on the subject. To mark the occasion, we have compiled five very simple tips for more IT security in everyday life.

 

Read the rest of this entry »

Beware of Meeting Invite Phishing Scam!

November 21st, 2022 | by
Laptop in front of orange background with incoming e-mail

Source: Own illustration

The way we work together has changed fundamentally in recent years. Among the major changes is the shift of work processes to the home office. Not only have everyday tasks had to be shifted into virtual space, but also the entire communication process. This is how online meetings and video conferencing became a central part of our working lives. The digitization of these work processes brings many benefits. However, it also confronts many companies and organizations with major challenges. One of these challenges is the drastic increase in cyber attacks. As is so often the case, Internet fraudsters have taken advantage of the new situation and quickly developed a variety of new types of fraud methods. These include, for example, phishing attempts via appointment invitations.

Read the rest of this entry »

TSM Backup “Read Only”

November 18th, 2022 | by
Cup with text

No backup? No mercy! (Source: IT Center)

Attention!

As part of the backup transition 2022, a new platform for data backup and recovery has been built at RWTH Aachen University in the last months. Together with the manufacturers Hitachi Vantara and Commvault, the backup team of the IT Center has set up a new backup infrastructure, which in the future will not only provide the RWTH, but also other universities in NRW with the Datensicherung.nrw service.

In this context, we are gradually saying goodbye to the previous backup solution, the “TSM backup”.

Read the rest of this entry »

The Story of the Bug

November 9th, 2022 | by
Code lines „Failed to load resource“

Source: unsplash.com

The download does not work? Probably a bug.

The lights of the WLAN router flash wildly in all possible colors? Could be a bug.

The software only throws error messages? A bug, for sure.

The term “bug” has long since crept into everyday life. Most people know it from working with electronic devices.

 

Read the rest of this entry »

RegApp – Start of the pilot phase on the cluster

November 2nd, 2022 | by
Login window with username and unrecognizable password

You will no longer be able to assign your password for the HPC account in self-service. (Source: Pixabay)

Cluster users beware!

In preparation for higher security measures when logging in to the RWTH HPC Cluster, your HPC accounts will be switched to RegApp from 02. November 2022.

What is behind this and what will change for you?

Read the rest of this entry »

Honeypot – How to Lure Cyber Criminals

October 7th, 2022 | by
Honey

Source: Freepik

Sometimes the best defence is a strong offensive. When it comes to IT security, the demand for offensive security measures is greater than ever. These often rely on techniques and approaches that are actually used by criminal hackers to lure user into traps. But attackers themselves can also be tricked into a trap. Honeypots are not only used to attract bears. They can also be used to catch cybercriminals in the act. In this article, we will explain what a honeypot is and how it can be used to increase IT security. Read the rest of this entry »

Attention: Spear Phishing Emails in Circulation

September 30th, 2022 | by
Arrow through laptop

Source: Own illustration

In the last weeks, there have been more spear phishing attacks on RWTH email addresses. In this article, we would like to make you aware of these attacks and explain how you can recognize spear phishing emails. You have received a spear phishing email to your RWTH email address? We explain how you should best proceed. Read the rest of this entry »

Email Security – Why Are Redirections Bad?

September 7th, 2022 | by
Illustration mail correspondence

Source: Freepik

The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.

In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.

 

 

Read the rest of this entry »

The IT Center’s IT Security Measures

September 2nd, 2022 | by
Falling dominoes

Source: Freepik

With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »

Artificial Intelligence – Curse or Blessing for IT Security?

August 29th, 2022 | by
Concept of digital transformation of the brain of AI technology

Source: Freepik

We are increasingly coming across the term “artificial intelligence” (AI). Whenever we come across this term that has become a fashionable phenomenon in the media, there are regularly reports about self-thinking AI, fully autonomous means of transport or other similar applications. For many of us, it can be hard to figure out what is actually meant by the term. However, the application areas of AI that seem to be particularly popular in the media are in reality only a very small segment of the actual application field of AI. Many a user would probably even be surprised to know in which areas AI is already being implemented today. In this article, we would like to take a closer look at the term and explain what role artificial intelligence can play in the field of IT security.

Read the rest of this entry »