Categories
Pages
-

IT Center Blog

Schlagwort: ‘Cybersicherheit’

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »

Types of Firewalls

October 16th, 2024 | by
Firewall

Source: Freepik

In the first part of our blog series, we covered the basics of firewalls: what they are, how they work, and why they are essential for network security. Today, we will take a closer look at the different types of firewalls used in IT-Security.

 

Read the rest of this entry »

Increased Cyber Security at RWTH Through MFA Introduction

July 29th, 2024 | by
Security concept illustration of people holding a chain

Source: Freepik

Universities are increasingly becoming the target of cyber attacks. According to the Federal Office for Information Security (BSI), the current threat level is higher than ever before [1]. In view of this growing threat and the increasing number of corresponding attacks, the Ministry of Culture and Science (MKW) of the state of North Rhine-Westphalia (NRW) published an Agreement on Cyber Security at Universities (VzC) at the end of 2023. With a total of 12 measures, this serves as a basis for securing university networks. At the same time, the BSI regularly recommends targeted measures to defend against threats.

Against this backdrop, the specific protection of RWTH Aachen University’s IT infrastructure is increasingly indispensable.

 

Read the rest of this entry »

Ethical Hacking: Hacking for More Security

July 19th, 2024 | by
A woman focused on computer code, engaged in hacking activities.

Source: Freepik

Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.

 

Read the rest of this entry »

World Backup Day: Security Through Data Backup

March 27th, 2024 | by
Person holding laptop with cloud icons in background

Source: Freepik

March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.

Read the rest of this entry »

Spoofing: An Underestimated Threat

March 18th, 2024 | by
Businessman with megaphone that says "Lie"

Source: Freepik

In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.

Read the rest of this entry »

Romance Without Risk: IT Security

February 14th, 2024 | by
Two vectors hugging

Source: Freepik

Valentine’s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.

In this article, you can find out how to order flowers online, buy Valentine’s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!

Read the rest of this entry »

Data Protection Day: Our Privacy

January 29th, 2024 | by
Data Security Icons

Source: Own illustration

On January 28, we celebrate European Data Protection Day to draw attention to the importance of data protection. This annual event is a reminder of the fundamental right to privacy and highlights efforts to strengthen the protection of personal data.

Read the rest of this entry »

Cluster security – MFA Now Mandatory

January 10th, 2024 | by
Lock with security icons around it

Source: Freepik

In May 2020, several supercomputers in Europe were attacked by hackers. They used compromised accounts of users on external systems. To prevent such attacks, the introduction of multi-factor authentication on the HPC cluster is an important step.

Read the rest of this entry »

New Year’s Resolutions for More IT Security

January 5th, 2024 | by
Empty list for New Year's resolutions

Source: Freepik

For many, it’s part of the New Year’s ritual: New Year’s resolutions! According to Statista, the top three resolutions in Germany this year include saving more money, doing more sport, and eating more healthily. 17% of respondents even said they wanted to spend less time on social networks. When using social media, however, it is also important to make the user experience itself as secure as possible.

In the following blog post, we introduce you to five resolutions that will help you increase your IT security and support your approach to IT.

 

Read the rest of this entry »