Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Macros – Small word, big risk

March 10th, 2021 | by
Computer in close up

Source: Unsplash

Every now and then you hear and read about macros in Office applications, about documents in which macros are included. These are often sent by e-mail and can lead to dangerous security incidents.
Of course, RWTH Aachen University and the IT Center have taken security measures in this regard. But not everyone is aware of what macros actually are and how dangerous they are not only for private individuals but also for companies. In the following, we will inform you about the most important risks and explain how you can protect yourself.

Read the rest of this entry »

(Deutsch) DFN-AAI sichert den kontrollierten Zugriff auf geschützte Ressourcen

January 18th, 2021 | by

Sorry, this entry is only available in Deutsch.

(Deutsch) IDM.NRW – Vorprojekt Machbarkeitsstudie

January 13th, 2021 | by

Sorry, this entry is only available in Deutsch.

Submission of DFN certificate requests possible again

January 11th, 2021 | by

As of today, January 11, 2021, it will once again be possible to submit DFN user and server certificate applications in person at the IT Center. Applications will be accepted as usual at Seffenter Weg 23 at the upper entrance. In order to drop off your user and server certificate applications in person, you need to book an appointment via our appointment scheduler.

Man shows his photo ID

Do not forget: Certificate applications only upon presentation of an official, valid photo ID!
Source: Eigene Darstellung

Read the rest of this entry »

(Deutsch) Fünf gute Vorsätze fürs neue Jahr

January 4th, 2021 | by

Sorry, this entry is only available in Deutsch.

Important tips to better password security

November 13th, 2020 | by

Computers and internet access are now an integral part of our everyday lives. We use them not only for work, but also for private purposes. Whether it’s work-related documents, conversations with colleagues, friends and family, bank documents or the exchange of private photos; none of this should be visible to everyone.Whoever uses such technologies should also protect themselves. In order to protect yourself, an efficient password protection is essential.

Login interface on a website

Source: Pixabay

Read the rest of this entry »

Social Engineering – or: How we get tricked

November 6th, 2020 | by

Sometimes you just can’t say “no”. When the fundraising rescue workers are at the front door or in the pre-Christmas season the opportunities to do a good deed one more time this year are increasing. Of course we are happy to help, for we are social beings after all. However, this humanitarian side of us is being exploited increasingly. Social engineering aims to motivate people to do things they would not do under normal circumstances. This manipulation occurs everywhere – digitally, as well as in the real world.

Source: Pixabay

Read the rest of this entry »

Phishing – More Than Just a Sports Activity

November 4th, 2020 | by

In order to understand phishing and the context of the problem in more detail, it is worth making an excursion into social engineering. Social engineering refers to the consideration of social needs (of people).

Source: Pixabay

Read the rest of this entry »

(Deutsch) Erneute Bedrohung durch Emotet

October 14th, 2020 | by

Sorry, this entry is only available in Deutsch.

(Deutsch) Go Live -Verschlüsselung mit Boxcryptor an der RWTH Aachen University

September 25th, 2020 | by

Sorry, this entry is only available in Deutsch.