IT Center Blog

Schlagwort: ‘IT-Security’

Ethical Hacking: Hacking for More Security

July 19th, 2024 | by
A woman focused on computer code, engaged in hacking activities.

Source: Freepik

Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.


Read the rest of this entry »

Help, My Email Password Was Compromised!

July 17th, 2024 | by
Laptop with spam pop-ups

Source: Freepik

In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.

In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.

Read the rest of this entry »

Information for Employees – Security of Webex

June 24th, 2024 | by
Green lock on a black circuit board

Source: Freepik

The communication and collaboration tool Webex has been in use at RWTH Aachen University since November 2023. This is currently being criticized due to security incidents (German only).

As IT security is a very high priority for RWTH, the issue is being taken very seriously by both the IT Center as a whole and the relevant specialist department.

Following discussions with the manufacturer Cisco and our own intensive investigation, we were able to establish that RWTH and its Webex users are not affected by the security incidents.

The necessary security precautions had already been implemented at RWTH before Webex was introduced.

Read the rest of this entry »

Secure Access to the Institute VPN at RWTH Aachen University

June 3rd, 2024 | by

Source: Own illustration

In order to be able to access the RWTH network from anywhere in a secure, encrypted way, the academic institutions of RWTH Aachen University can provide a VPN instance to a restricted group of people if required. This allows users to securely access their resources at their institution. As part of the introduction of multi-factor authentication at RWTH, the security requirements for these VPN instances have increased.

There are various options for managing and enabling VPN access, which we would like to introduce to you in the following blog post.

Read the rest of this entry »

World Backup Day: Security Through Data Backup

March 27th, 2024 | by
Person holding laptop with cloud icons in background

Source: Freepik

March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.

Read the rest of this entry »

More IT Security for VPN: Introduction of MFA

January 24th, 2024 | by
Encrypted and protected password entry

Source: Own illustration

Due to the growing digitalization in the private and professional environment, the risk of cyberattacks and phishing attacks is also constantly increasing. Universities are also becoming an increasingly frequent target of such attacks. This is why IT security is a key issue at RWTH Aachen University.

On February 1, 2024, multifactor-authentication (MFA) will be introduced for the VPN service at RWTH. This will significantly improve the protection of the IT services you use. The following blog post will explain what you need to do now.


Read the rest of this entry »

New Year’s Resolutions for More IT Security

January 5th, 2024 | by
Empty list for New Year's resolutions

Source: Freepik

For many, it’s part of the New Year’s ritual: New Year’s resolutions! According to Statista, the top three resolutions in Germany this year include saving more money, doing more sport, and eating more healthily. 17% of respondents even said they wanted to spend less time on social networks. When using social media, however, it is also important to make the user experience itself as secure as possible.

In the following blog post, we introduce you to five resolutions that will help you increase your IT security and support your approach to IT.


Read the rest of this entry »

Social Engineering: Deception in Cyberspace

December 27th, 2023 | by
Abstract Concept Illustration of Cyber Security

Source: Freepik

In the world of cyber security, it’s not just technology that plays a crucial role. People are an equally important factor, and this is where social engineering comes in. This sophisticated method specifically exploits human behaviour and weaknesses to gain access to sensitive data or cause damage.


Read the rest of this entry »

The IT Center Picture Puzzle: IT Center Management

July 12th, 2023 | by
Photo of the IT Center Management and interviewers

Quelle: Eigene Darstellung

#MeetMeWednesday: Our blog series “The IT Center Picture Puzzle” is drawing to a close, and to cap it all off, we have a particularly interesting interview in store for you. This time, the IT Center Management, Professor Müller and Mr. Bündgens, answer our questions. They talk about their daily tasks as well as about exciting projects and developments that will soon take place at the IT Center.

By the way, the key word we were looking for was “leadership”. Could you guess it? Find out more in this article.

Read the rest of this entry »

Cybersecurity 101: Protecting the Digital Footprint in the Digital Age

July 3rd, 2023 | by
Three footprints with blue digital background

Source: Own Illustration

In today’s digital age, our lives are increasingly intertwined with the online world. From social media profiles to online banking accounts, we leave a digital footprint that can be vulnerable to cyber threats. Protecting our digital presence and maintaining online privacy is more important now than ever. In this blog post, we’ll go over the basics of cybersecurity and provide practical tips for protecting your digital footprint.

Read the rest of this entry »