Categories
Pages
-

IT Center Blog

Schlagwort: ‘IT-Security’

Secure Access to the Institute VPN at RWTH Aachen University

June 3rd, 2024 | by
Cables

Source: Own illustration

In order to be able to access the RWTH network from anywhere in a secure, encrypted way, the academic institutions of RWTH Aachen University can provide a VPN instance to a restricted group of people if required. This allows users to securely access their resources at their institution. As part of the introduction of multi-factor authentication at RWTH, the security requirements for these VPN instances have increased.

There are various options for managing and enabling VPN access, which we would like to introduce to you in the following blog post.

Read the rest of this entry »

World Backup Day: Security Through Data Backup

March 27th, 2024 | by
Person holding laptop with cloud icons in background

Source: Freepik

March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.

Read the rest of this entry »

More IT Security for VPN: Introduction of MFA

January 24th, 2024 | by
Encrypted and protected password entry

Source: Own illustration

Due to the growing digitalization in the private and professional environment, the risk of cyberattacks and phishing attacks is also constantly increasing. Universities are also becoming an increasingly frequent target of such attacks. This is why IT security is a key issue at RWTH Aachen University.

On February 1, 2024, multifactor-authentication (MFA) will be introduced for the VPN service at RWTH. This will significantly improve the protection of the IT services you use. The following blog post will explain what you need to do now.

 

Read the rest of this entry »

New Year’s Resolutions for More IT Security

January 5th, 2024 | by
Empty list for New Year's resolutions

Source: Freepik

For many, it’s part of the New Year’s ritual: New Year’s resolutions! According to Statista, the top three resolutions in Germany this year include saving more money, doing more sport, and eating more healthily. 17% of respondents even said they wanted to spend less time on social networks. When using social media, however, it is also important to make the user experience itself as secure as possible.

In the following blog post, we introduce you to five resolutions that will help you increase your IT security and support your approach to IT.

 

Read the rest of this entry »

Social Engineering: Deception in Cyberspace

December 27th, 2023 | by
Abstract Concept Illustration of Cyber Security

Source: Freepik

In the world of cyber security, it’s not just technology that plays a crucial role. People are an equally important factor, and this is where social engineering comes in. This sophisticated method specifically exploits human behaviour and weaknesses to gain access to sensitive data or cause damage.

 

Read the rest of this entry »

The IT Center Picture Puzzle: IT Center Management

July 12th, 2023 | by
Photo of the IT Center Management and interviewers

Quelle: Eigene Darstellung

#MeetMeWednesday: Our blog series “The IT Center Picture Puzzle” is drawing to a close, and to cap it all off, we have a particularly interesting interview in store for you. This time, the IT Center Management, Professor Müller and Mr. Bündgens, answer our questions. They talk about their daily tasks as well as about exciting projects and developments that will soon take place at the IT Center.

By the way, the key word we were looking for was “leadership”. Could you guess it? Find out more in this article.

Read the rest of this entry »

Cybersecurity 101: Protecting the Digital Footprint in the Digital Age

July 3rd, 2023 | by
Three footprints with blue digital background

Source: Own Illustration

In today’s digital age, our lives are increasingly intertwined with the online world. From social media profiles to online banking accounts, we leave a digital footprint that can be vulnerable to cyber threats. Protecting our digital presence and maintaining online privacy is more important now than ever. In this blog post, we’ll go over the basics of cybersecurity and provide practical tips for protecting your digital footprint.

Read the rest of this entry »

QR Code Attacks

June 12th, 2023 | by
QR Code with mobile phone

Source: Own illustration

QR codes have become increasingly popular in recent years and are now used in almost all areas – whether in advertising, retail or public spaces. Especially since the Corona pandemic, QR codes have gained a lot of importance. For example, they made contact tracking in restaurants or contactless ordering in the catering industry possible. Many users appreciate QR codes because of their simplicity and the time they save, as they can be easily captured with a smartphone. At the same time, however, QR codes can also pose a threat to IT security. In this article, we’ll explain what you should always keep in mind when using QR codes.

 

Read the rest of this entry »

Discontinuation of “Sophos Antivirus” – What You Have to Do Now

May 24th, 2023 | by
Drawing of a cloud surrounded by lock, shield, and wifi symbol

Source: Freepik

Within the framework of an NRW state license agreement, institutions of the RWTH Aachen University can use the virus scanner “Sophos Antivirus” as well as the corresponding management console “Sophos Enterprise Console” free of charge. In addition, members of the RWTH are allowed to use the software privately.

Now the company “Sophos” has discontinued the on-premises variants of its virus scanner as well as the management console “Sophos Enterprise Console” on July 20, 2023. Starting then, these products will no longer be provided with updates by the manufacturer. To find out if and/or how this is relevant to you, continue reading this blog post.

Read the rest of this entry »

World Backup Day – Back Up Your Data Today!

March 31st, 2023 | by
Laptop with backup lettering

Source: Own illustration

In an increasingly digitalized world where we create, exchange and store countless pieces of information every day, the topic of data backup is becoming more and more important. We all depend on our data, whether at work, in education or in our private lives. But this valuable information can be lost quickly, for example, due to technical failures, cyberattacks or even human error. The number of incidents in which companies and private individuals suffer data loss is increasing every year. An effective data protection strategy is therefore more important than ever before. Read the rest of this entry »