Kategorie: ‘IT-Security’
ZKI – From Project to Working Group
As a partner, the IT Center actively supports the design of digitalisation processes at RWTH Aachen University. This also includes the use of cloud services and the correspondingly increasing needs of teaching staff, researchers and students at RWTH Aachen University. The flexibility and scalability of cloud services can be a means of meeting the ever more rapidly changing IT requirements of users.
Information for Employees – Security of Webex
The communication and collaboration tool Webex has been in use at RWTH Aachen University since November 2023. This is currently being criticized due to security incidents (German only).
As IT security is a very high priority for RWTH, the issue is being taken very seriously by both the IT Center as a whole and the relevant specialist department.
Following discussions with the manufacturer Cisco and our own intensive investigation, we were able to establish that RWTH and its Webex users are not affected by the security incidents.
The necessary security precautions had already been implemented at RWTH before Webex was introduced.
The Importance of Open Source Software
Open source software (OSS) has become a cornerstone of modern IT and plays a crucial role in the development of technology and software. Open source code enables innovation, flexibility and cost efficiency.
But what exactly is open source software and why is it so important?
Secure Access to the Institute VPN at RWTH Aachen University
In order to be able to access the RWTH network from anywhere in a secure, encrypted way, the academic institutions of RWTH Aachen University can provide a VPN instance to a restricted group of people if required. This allows users to securely access their resources at their institution. As part of the introduction of multi-factor authentication at RWTH, the security requirements for these VPN instances have increased.
There are various options for managing and enabling VPN access, which we would like to introduce to you in the following blog post.
Ethical Decision-Making in IT
From automated decision-making to data protection and privacy issues, technological developments have a significant impact on society. Today, information and communication technologies have become a matter of course and indispensable in all areas of life. Ethics has long been an issue in business and the world of IT is also increasingly concerned with moral issues. In the context of artificial intelligence (AI) in particular, such conflicts are becoming increasingly prominent. In today’s blog post, we want to shed light on ethical influences in the IT sector.
World Backup Day: Security Through Data Backup
March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.
Spoofing: An Underestimated Threat
In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.
Email Security – How to Configure Forwarding Correctly
In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).
Video Tutorials on Multifactor-Authentication and the Token Manager
On February 1, 2024, the RWTH Aachen University introduced multifactor-authentication (MFA) for the VPN service. This will significantly improve the protection of the IT services you use.
You can learn how to use MFA for VPN and how to set up your second authentication factor in the Token Manager in the first videos in our video series on multifactor-authentication, which we are presenting to you today.
Romance Without Risk: IT Security
Valentine’s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.
In this article, you can find out how to order flowers online, buy Valentine’s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!