Categories
Pages
-

IT Center

Schlagwort: ‘IT security’

Backdoors: Access Through an Alternative Access Point

January 17th, 2022 | by
A door that is open a crack.

Unnoticed access through the backdoor can be particularly tricky. (Source: Pixabay.com)

In life, sometimes it can be very useful to have a plan B or to keep a backdoor open. But would you leave your house and hide the keys to the backdoor under the doormat? For burglars, this setup would probably be an easy target. In IT as well, so-called backdoors are a very popular target for hackers. However, these backdoors are much more tricky and discreet than an open door or hidden keys under a doormat. Because even when the original breach of security, such as an open window, no longer exists, cybercriminals can still get in and out as they please via the implemented backdoor.

Read the rest of this entry »

Macros – Our Measures For Your Security

September 1st, 2021 | by
Illustration data theft

Photo: Freepik

***Change of editorial department on 02.11.2021***

E-mails are often misused for phishing attempts and to spread malware. Especially emails with file attachments should be checked critically. In our first article on macros, we explained what macros are and why they can be dangerous. In today’s article, you will learn what precautions are now being taken, what alternative options are available for sending documents, and what precautions you can take to protect yourself from files with dangerous macros. Read the rest of this entry »

How can I recognize trustworthy websites?

August 23rd, 2021 | by
Tablet

From malware to phishing – there are plenty of dangers on the Internet. (Photo: Pixabay)

Surfing the Internet is part of our everyday lives. Both in our private lives and at work, we are using the World Wide Web. We visit websites to inform ourselves, to communicate and even to shop. In the process, data from your own device will automatically be transferred to the website you are visiting and vice versa. When surfing, you should therefore critically inspect every website you visit. Just like in the real world, there are safe places on the Internet and places that you should avoid for your own safety. Nevertheless, how can you judge a website correctly and how can you distinguish between a trustworthy and an untrustworthy website? The following criteria should help you! Read the rest of this entry »

IT-SAD: IT Security Awareness Days 2021!

June 7th, 2021 | by
IT Security Awareness Days 2021: attend for free and without any registration

Online and without any registration – the IT Security Awareness Days 2021 (Picture: TU Braunschweig)

Trustworthy IT infrastructure is essential these days, especially when it comes to IT security. But did you know that most cyber attacks take advantage of human vulnerabilities? Terms like social engineering and (spear-)fishing are becoming more and more popular. In other words, IT security is not limited to the implementation of a solid IT infrastructure. In fact, the human factor can be the greatest vulnerability. Accordingly, it is particularly crucial to involve every single user and to educate them about the various threats.

Read the rest of this entry »