Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Spoofing: An Underestimated Threat

March 18th, 2024 | by
Businessman with megaphone that says "Lie"

Source: Freepik

In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.

Read the rest of this entry »

Mail Security – How to Configure Forwarding Correctly

March 13th, 2024 | by
Hand-drawn text messages between two cell phones on the board

Source: Freepik

In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).

Read the rest of this entry »

Video Tutorials on Multifactor-Authentication and the Token Manager

March 8th, 2024 | by
Illustration Laptop with Video and film roll

Source: Freepik

On February 1, 2024, the RWTH Aachen University introduced multifactor-authentication (MFA) for the VPN service. This will significantly improve the protection of the IT services you use.

You can learn how to use MFA for VPN and how to set up your second authentication factor in the Token Manager in the first videos in our video series on multifactor-authentication, which we are presenting to you today.

Read the rest of this entry »

Romance Without Risk: IT Security

February 14th, 2024 | by
Two vectors hugging

Source: Freepik

Valentine’s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.

In this article, you can find out how to order flowers online, buy Valentine’s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!

Read the rest of this entry »

A Comprehensive Guide to eduroam

February 5th, 2024 | by

Source: Freepik

At the IT Center of RWTH Aachen University, we understand the importance of reliable and secure network connectivity for our students, lecturers, and employees. That’s why we are proud to offer eduroam, a global Wi-Fi service that provides access to the internet across campuses and in teaching and research institutions worldwide.

In this blog post, we will delve into the key features and benefits of eduroam, as well as provide you useful information.

Read the rest of this entry »

Data Protection Day: Our Privacy

January 29th, 2024 | by
Data Security Icons

Source: Own illustration

On January 28, we celebrate European Data Protection Day to draw attention to the importance of data protection. This annual event is a reminder of the fundamental right to privacy and highlights efforts to strengthen the protection of personal data.

Read the rest of this entry »

More IT Security for VPN: Introduction of MFA

January 24th, 2024 | by
Encrypted and protected password entry

Source: Own illustration

Due to the growing digitalization in the private and professional environment, the risk of cyberattacks and phishing attacks is also constantly increasing. Universities are also becoming an increasingly frequent target of such attacks. This is why IT security is a key issue at RWTH Aachen University.

On February 1, 2024, multifactor-authentication (MFA) will be introduced for the VPN service at RWTH. This will significantly improve the protection of the IT services you use. The following blog post will explain what you need to do now.

 

Read the rest of this entry »

Pioneering Steps into the Future of AI

January 17th, 2024 | by
Businessman draws a block diagram plan

Source: Freepik

Germany has taken significant steps in recent years to advance the development and application of artificial intelligence. The country’s AI action plan and digital strategy form the backbone of these efforts, setting out guidelines and measures to promote AI innovation.

 

Read the rest of this entry »

Cluster security – MFA Now Mandatory

January 10th, 2024 | by
Lock with security icons around it

Source: Freepik

In May 2020, several supercomputers in Europe were attacked by hackers. They used compromised accounts of users on external systems. To prevent such attacks, the introduction of multi-factor authentication on the HPC cluster is an important step.

Read the rest of this entry »

New Year’s Resolutions for More IT Security

January 5th, 2024 | by
Empty list for New Year's resolutions

Source: Freepik

For many, it’s part of the New Year’s ritual: New Year’s resolutions! According to Statista, the top three resolutions in Germany this year include saving more money, doing more sport, and eating more healthily. 17% of respondents even said they wanted to spend less time on social networks. When using social media, however, it is also important to make the user experience itself as secure as possible.

In the following blog post, we introduce you to five resolutions that will help you increase your IT security and support your approach to IT.

 

Read the rest of this entry »