Categories
Pages
-

IT Center Blog

Kategorie: ‘IT-Security’

Macros – Our Measures For Your Security

September 1st, 2021 | by
Illustration data theft

Photo: Freepik

***Change of editorial department on 02.11.2021***

E-mails are often misused for phishing attempts and to spread malware. Especially emails with file attachments should be checked critically. In our first article on macros, we explained what macros are and why they can be dangerous. In today’s article, you will learn what precautions are now being taken, what alternative options are available for sending documents, and what precautions you can take to protect yourself from files with dangerous macros. Read the rest of this entry »

How can I recognize trustworthy websites?

August 23rd, 2021 | by
Tablet

Source: Pixabay

Surfing the Internet is part of our everyday lives. Both in our private lives and at work, we are using the World Wide Web. We visit websites to inform ourselves, to communicate and even to shop. In the process, data from your own device will automatically be transferred to the website you are visiting and vice versa. When surfing, you should therefore critically inspect every website you visit. Just like in the real world, there are safe places on the Internet and places that you should avoid for your own safety. Nevertheless, how can you judge a website correctly and how can you distinguish between a trustworthy and an untrustworthy website? The following criteria should help you! Read the rest of this entry »

The RWTH email address – your faithful companion to stay up to date

August 6th, 2021 | by
Illustration Computer mit Email

Source: Pixabay

To avoid chaos, in this article we summarize what the RWTH email address is and what else you need to keep in mind around it. Read the rest of this entry »

Dark Data – Data that no one knows about anymore

July 21st, 2021 | by
Eisberg von oben. Unter der Oberfläche liegt der Großteil des Eisberges verborgen.

Source: Unsplash

“Keeping order is not difficult. Cleaning up, on the other hand, is very difficult.” That’s kind of the saying, isn’t it? No matter how you spin the proverb, this principle applies not only to children’s rooms and closets, it also applies to our digital memories, and many people are not yet aware of this. Just because we can’t touch digitized data doesn’t mean it doesn’t waste space or energy. In Germany, around 66 percent of the data held is “dark” and lies below the surface of users’ consciousness. Read this article to find out what this is all about.

Read the rest of this entry »

Safe on the Internet: Certificate change of RWTH Single Sign-On

July 19th, 2021 | by
certificate SSO

Securely connected? A look at the URL and a click on the lock symbol will show you!
Source: Own illustration

“The connection is secure” – These words contain a short but revealing piece of information. A valid certificate for a website indicates if it has a secure connection and sensitive data, such as passwords or bank data, are transmitted in a protected environment – this is also the case with RWTH Single Sign-On. The certificate for sso.rwth-aachen.de has now been replaced, as the existing one expires on July 28, 2021. Have you noticed this? Some services were temporarily unavailable during the changeover, but are now running again. We’ll show you why it’s worth taking a look at the certificate and what you should keep in mind when using the RWTH Single Sign-On. Read the rest of this entry »

IT-SAD: IT Security Awareness Days 2021!

June 7th, 2021 | by
IT Security Awareness Days 2021: attend for free and without any registration

Online and without any registration – the IT Security Awareness Days 2021
Source: TU Braunschweig

Trustworthy IT infrastructure is essential these days, especially when it comes to IT security. But did you know that most cyber attacks take advantage of human vulnerabilities? Terms like social engineering and (spear-)fishing are becoming more and more popular. In other words, IT security is not limited to the implementation of a solid IT infrastructure. In fact, the human factor can be the greatest vulnerability. Accordingly, it is particularly crucial to involve every single user and to educate them about the various threats.

Read the rest of this entry »

Safety First – Secure logout with RWTH Single Sign-On

May 17th, 2021 | by
The login mask of the RWTH Single Sign-On.

Source: Own illustration

Everyone who studies or works at RWTH knows it: the RWTH Single Sign-On.

This is not a dating service, but an application with which you can log in to almost all RWTH services. What is particularly charming is that you do not have to remember an infinite number of access data, but only one user name and the corresponding password.

In addition, RWTH Single Sign-On recognizes if you are already logged in to a service, for example RWTHonline. If you then log in to RWTHmoodle, RWTH Single Sign-On waves the user through directly using the underlying “Shibboleth” application.

Read the rest of this entry »

Better Safe Than Sorry – Multifactor-Authentication

May 5th, 2021 | by
Multi-factor authentication for more data security

Source: Pixabay

In the context of the current pandemic and the latest massive cyberattacks, IT security is more relevant than ever in our daily lives. With many people working from home and using cloud applications to access corporate data, the risk of unauthorised access to this data is growing. . Passwords can be stolen in various manners, ranging from looking over one’s shoulder, a break-in at a service provider on the Internet to malware. Passwords are particularly susceptible to being stolen. Additionally, if you use the same password for multiple services, the quantity of stolen data might be massive. What can we do to ensure our data remains secure?

Read the rest of this entry »

RWTH mails in the spam folder – why do they end up there and what you can do about it?

May 3rd, 2021 | by
Spam Mails

Source: Freepik

The spam folder – that place to which undesired emails are banished. This is exactly what the term “spam” refers to: e-mails that you don’t want to receive, which nonetheless keep finding their way into our inbox. Generally, the spam folder is a preset folder provided by the e-mail client, into which unsolicited e-mails are automatically moved with the help of anti-spam software. In fact, most of the time this sorting out works quite well.

Read the rest of this entry »

(Deutsch) Wie kommt der Banking-Trojaner zu mir? Per E-Mail? NEIN: per SMS!

March 24th, 2021 | by

Sorry, this entry is only available in Deutsch.