Schlagwort: ‘IT-Security’
IT Security When Traveling

Source: Freepik
Those who frequently use public transportation are often reminded to take care of their personal belongings. The material damage caused by theft or loss is obvious. The dangers of data theft are perhaps less apparent but have equally serious consequences. These consequences include identity theft, unauthorized access to financial data and potential damage to your personal and professional reputation.
With the right IT security tips, you can reliably protect your data on the move and travel with peace of mind. In this blog post, you can find out how to protect your data effectively – whilst enjoying every trip in peace.
European Data Privacy Day 2025

Source: Freepik
Every year on January 28 is European Data Privacy Day – a date that reminds us of the importance of protecting our personal data and privacy in the digital world. We at the IT Center take this day as an opportunity to draw attention to key aspects of data protection. We already emphasised the importance of protecting our personal data in last year’s article.
Updates Again! – Why Are Regular Software Updates So Important?

Source: Stockvault
An update is the updating of the version of a software, information or version. In the case of software updates, for example, a distinction is made between security and firmware updates, and in the case of information updates, for example, between situation, news and status updates. Version updates usually refer to technical devices.
Beware of Tech Support Scams: How You Can Protect Yourself

Source: Freepik
In today’s digital world, we are constantly connected to technology – whether it’s through our smartphones, computers or other electronic devices. Unfortunately, there are people who take advantage of this fact to scam the unsuspecting. One common scam that many fall victim to is the tech support scam. In this blog post, we want to explain how the scam works and how you can protect to protect yourself.
Firewalls – The OSI Model

Source: Freepik
Welcome to the third and final part of our blog series on firewalls! In the first post we looked at the role of firewalls, and in the second we looked at the types of firewalls. In this post, we take a look at the OSI model (Open Systems Interconnection Model) and the different levels at which firewalls can operate.
Halloween: The Nightmares of Cyber Security

Source: Freepik
Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.
Basics at RWTH: E-Mail

Source: Freepik
As part of our blog series “Basics at RWTH”, today we are introducing you to the RWTH e-mail service, which is essential for your daily communication in everyday university life. We have compiled the most important information for you so that you can get started quickly and easily with your e-mail inbox – if you haven’t already done so.
Types of Firewalls

Source: Freepik
In the first part of our blog series, we covered the basics of firewalls: what they are, how they work, and why they are essential for network security. Today, we will take a closer look at the different types of firewalls used in IT-Security.
The Role of Firewalls in Network Security

Source: Freepik
In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »