Schlagwort: ‘IT security’
Updates Again! – Why Are Regular Software Updates So Important?
An update is the updating of the version of a software, information or version. In the case of software updates, for example, a distinction is made between security and firmware updates, and in the case of information updates, for example, between situation, news and status updates. Version updates usually refer to technical devices.
Beware of Tech Support Scams: How You Can Protect Yourself
In today’s digital world, we are constantly connected to technology – whether it’s through our smartphones, computers or other electronic devices. Unfortunately, there are people who take advantage of this fact to scam the unsuspecting. One common scam that many fall victim to is the tech support scam. In this blog post, we want to explain how the scam works and how you can protect to protect yourself.
Halloween: The Nightmares of Cyber Security
Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.
Basics at RWTH: E-Mail
As part of our blog series “Basics at RWTH”, today we are introducing you to the RWTH e-mail service, which is essential for your daily communication in everyday university life. We have compiled the most important information for you so that you can get started quickly and easily with your e-mail inbox – if you haven’t already done so.
Types of Firewalls
In the first part of our blog series, we covered the basics of firewalls: what they are, how they work, and why they are essential for network security. Today, we will take a closer look at the different types of firewalls used in IT-Security.
IT Professionals Day: Invisible Heroes
On September 17, 2024, we are celebrating IT Professionals Day – a global day of honor that puts the spotlight on all those people who often work behind the scenes but are indispensable to the functioning of our digital world. At the IT Center of RWTH Aachen University, we would like to use this occasion to pay well-deserved tribute to the IT professionals, the invisible heroes, who work behind the scenes every day.
The Role of Firewalls in Network Security
In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »
Ethical Hacking: Hacking for More Security
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Information for Employees – Security of Webex
The communication and collaboration tool Webex has been in use at RWTH Aachen University since November 2023. This is currently being criticized due to security incidents (German only).
As IT security is a very high priority for RWTH, the issue is being taken very seriously by both the IT Center as a whole and the relevant specialist department.
Following discussions with the manufacturer Cisco and our own intensive investigation, we were able to establish that RWTH and its Webex users are not affected by the security incidents.
The necessary security precautions had already been implemented at RWTH before Webex was introduced.