IT Center Blog

Schlagwort: ‘IT security’

Spoofing: An Underestimated Threat

March 18th, 2024 | by
Businessman with megaphone that says "Lie"

Source: Freepik

In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.

Read the rest of this entry »

Romance Without Risk: IT Security

February 14th, 2024 | by
Two vectors hugging

Source: Freepik

Valentine’s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.

In this article, you can find out how to order flowers online, buy Valentine’s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!

Read the rest of this entry »

Data Protection Day: Our Privacy

January 29th, 2024 | by
Data Security Icons

Source: Own illustration

On January 28, we celebrate European Data Protection Day to draw attention to the importance of data protection. This annual event is a reminder of the fundamental right to privacy and highlights efforts to strengthen the protection of personal data.

Read the rest of this entry »

Cluster security – MFA Now Mandatory

January 10th, 2024 | by
Lock with security icons around it

Source: Freepik

In May 2020, several supercomputers in Europe were attacked by hackers. They used compromised accounts of users on external systems. To prevent such attacks, the introduction of multi-factor authentication on the HPC cluster is an important step.

Read the rest of this entry »

Social Engineering: Deception in Cyberspace

December 27th, 2023 | by
Abstract Concept Illustration of Cyber Security

Source: Freepik

In the world of cyber security, it’s not just technology that plays a crucial role. People are an equally important factor, and this is where social engineering comes in. This sophisticated method specifically exploits human behaviour and weaknesses to gain access to sensitive data or cause damage.


Read the rest of this entry »

IT Fairytale Hour – Part 2

September 25th, 2023 | by
Animated woman woman looking through a magnifying glass comparing myths with facts.

Source: Freepik

Today we continue with our series, “All about the myths in the world of IT”.
If you missed the first part of the myths, feel free to check out our last post.

“The full moon causes sleepless nights” – a myth we all know. Experts have long since proven that the moon does not have magical powers. The brightness releases less melatonin in the brain, which helps us fall asleep.
So it’s worth taking another close look at widespread half-truths.

In the world of IT, there are myths that we can get to the bottom of together.
Today, it’s all about IT security and what you should know about it.


Read the rest of this entry »

E-Mail Security – Evaluation of DMARC Policy for Incoming Emails

August 30th, 2023 | by
Letters of a keyboard representing the word email

Source: Pixabay

In the fourth part of our e-mail security series, we would like to inform you about an innovation in our e-mail security policy.

After we reported on e-mail, e-mail statistics at RWTH Aachen University, and the SMTP protocol and its pitfalls in the first and second articles, and informed you about the DKIM identification protocol and DMARC in the third article, this fourth part is now about a new e-mail security requirement. To ensure that RWTH can continue to provide a secure e-mail service in the future, we have decided to introduce the evaluation of a sender’s DMARC policy when accepting mail at the university’s central mail gateway. You can find out what this means in this blog post.


Read the rest of this entry »

Cybersecurity 101: Protecting the Digital Footprint in the Digital Age

July 3rd, 2023 | by
Three footprints with blue digital background

Source: Own Illustration

In today’s digital age, our lives are increasingly intertwined with the online world. From social media profiles to online banking accounts, we leave a digital footprint that can be vulnerable to cyber threats. Protecting our digital presence and maintaining online privacy is more important now than ever. In this blog post, we’ll go over the basics of cybersecurity and provide practical tips for protecting your digital footprint.

Read the rest of this entry »

Pentest: The Attacks That Increase Security

February 27th, 2023 | by
Man with hat in front of laptop

Source: Own illustration

Cyber attacks have become a normal part of daily business for companies and organisations, and the question of how to protect against these attacks is playing an increasingly important role. It is particularly important to understand how hackers carry out their attacks. For this reason, many companies and organisations are even voluntarily becoming targets by commissioning IT experts with so-called penetration tests. In this article, we will explain exactly how these tests are performed. Read the rest of this entry »


February 1st, 2023 | by
Keyboard, notepad with password "12345" and combination lock on black background

Source: Freepik

Today is the official “change-your-password-day”. We would like to take this opportunity to once again draw attention to the importance of password security and have prepared a few tips for you.

Because hand on heart – when was the last time you changed your passwords?

Read the rest of this entry »