Kategorie: ‘IT-Security’
Macros – Small word, big risk
![Computer in close up](https://blog.rwth-aachen.de/itc/files/2021/03/philipp-katzenberger-iIJrUoeRoCQ-unsplash-300x200.jpg)
Source: Unsplash
Every now and then you hear and read about macros in Office applications, about documents in which macros are included. These are often sent by e-mail and can lead to dangerous security incidents.
Of course, RWTH Aachen University and the IT Center have taken security measures in this regard. But not everyone is aware of what macros actually are and how dangerous they are not only for private individuals but also for companies. In the following, we will inform you about the most important risks and explain how you can protect yourself.
(Deutsch) DFN-AAI sichert den kontrollierten Zugriff auf geschützte Ressourcen
Submission of DFN certificate requests possible again
As of today, January 11, 2021, it will once again be possible to submit DFN user and server certificate applications in person at the IT Center. Applications will be accepted as usual at Seffenter Weg 23 at the upper entrance. In order to drop off your user and server certificate applications in person, you need to book an appointment via our appointment scheduler.
![Man shows his photo ID](https://blog.rwth-aachen.de/itc/files/2021/01/show_picture-1024x768.jpg)
Do not forget: Certificate applications only upon presentation of an official, valid photo ID!
Source: Eigene Darstellung
Important tips to better password security
Computers and internet access are now an integral part of our everyday lives. We use them not only for work, but also for private purposes. Whether it’s work-related documents, conversations with colleagues, friends and family, bank documents or the exchange of private photos; none of this should be visible to everyone.Whoever uses such technologies should also protect themselves. In order to protect yourself, an efficient password protection is essential.
![Login interface on a website](https://blog.rwth-aachen.de/itc/files/2020/11/registration-3938434_1920-1-1024x683.jpg)
Source: Pixabay
Phishing – More Than Just a Sports Activity
In order to understand phishing and the context of the problem in more detail, it is worth making an excursion into social engineering. Social engineering refers to the consideration of social needs (of people).
![](https://blog.rwth-aachen.de/itc/files/2020/11/phishing-3390518_1280-1024x666.jpg)
Source: Pixabay