Categories
Pages
-

IT Center Blog

Schlagwort: ‘IT-Security’

Pentest: The Attacks That Increase Security

February 27th, 2023 | by
Man with hat in front of laptop

Source: Own illustration

Cyber attacks have become a normal part of daily business for companies and organisations, and the question of how to protect against these attacks is playing an increasingly important role. It is particularly important to understand how hackers carry out their attacks. For this reason, many companies and organisations are even voluntarily becoming targets by commissioning IT experts with so-called penetration tests. In this article, we will explain exactly how these tests are performed. Read the rest of this entry »

Safer Internet Day 2023

February 6th, 2023 | by

Whether at work, at university, or during leisure time – the Internet and digital devices have become an omnipresent part of everyday life for the majority of people. We surf the internet from anywhere, at any time of the day. The question that arises though is: How safe is our use of the new media actually?

Numerous studies have repeatedly shown that many users massively underestimate the dangers associated with the use of new media. Year after year, the press reports on numerous cyber attacks in which the naivety and ignorance of users often lead to serious consequences. There is consensus among experts on one point: the most effective way to strengthen IT security is to raise awareness and train each individual user. This is exactly what the global Safer Internet Day (SID) campaign aims to do. Read the rest of this entry »

Change-Your-Password-Day

February 1st, 2023 | by
Keyboard, notepad with password "12345" and combination lock on black background

Source: Freepik

Today is the official “change-your-password-day”. We would like to take this opportunity to once again draw attention to the importance of password security and have prepared a few tips for you.

Because hand on heart – when was the last time you changed your passwords?

Read the rest of this entry »

5 Tips on How to Keep Your Mobile Devices Safe

January 23rd, 2023 | by
Illustration of a smartphone

Source: Own illustration

They keep us connected at all times and in all places. They accompany us everywhere, wake us up, remind us of important appointments and provide us with entertainment. We are, of course, referring to smartphones. What was originally intended as a means of communication is now a calendar, camera, photo album, pocket watch, navigation device, pedometer and game console all in one. Even as most-used devices for Internet access, mobile devices have long since surpassed desktop computers. Smartphones are the very top of the list.

Mobile devices are practical everyday helpers, but they also hold a large amount of personal data, such as bank and credit card information. It is not uncommon for these end devices to even be used for two-factor authentication for bank transactions and other services. This makes them a popular target for hackers. With a few tips, you can effectively protect your mobile devices and the data stored on them. Read the rest of this entry »

New Year’s IT Resolutions

January 2nd, 2023 | by
Notepad with title "New Year's Resolutions" and human figure leaning on pencil

Source: Freepik

We all know it: At the end of each year, many people think about things they want to change or improve in the coming year. Some people want to finally take the plunge into the gym, others are determined to learn a new language, and others are planning to eat healthier. But what about resolutions in the IT sector? You haven’t dealt with that yet? No problem! The following suggestions will help you out a little bit.

 

 

 

Read the rest of this entry »

Threat Hunting – Tracking Down Threats

December 19th, 2022 | by
Illustration of a laptop with a magnifying glass. The magnifying glass makes security incidents visible.

Threat Hunters uncover security risks before they are detected by the system.

Source: Own illustration

After sneaking into a network, attackers can remain undetected for months, collecting data, searching for sensitive material, or acquiring credentials. They can then use this information to roam around the IT infrastructure, to observe it and to snatch even more data. The more data is tapped, the more severe the consequences of the attack may be. To identify such attacks as early as possible, a good defence strategy is essential. An important part of such a strategy is so-called Threat Hunting. Read the rest of this entry »

Computer Security Day: 5 Simple Tips to Improve IT Security

November 30th, 2022 | by
IT security symbols: cloud, magnifying glass, fingerprint, keyhole, email, cryptographic key

Source: Own Illustration

For most people, life without the Internet has long been unimaginable. Whether at home, at work or anywhere along the way – information technology is simply everywhere. However, its ubiquity also raises the question of its security. A question that experts already asked themselves back when the Internet had only just begun to develop. Since 1988, November 30 has been dedicated to IT security in many countries. The aim of this event is to raise general awareness of IT security and to educate users on the subject. To mark the occasion, we have compiled five very simple tips for more IT security in everyday life.

 

Read the rest of this entry »

Beware of Meeting Invite Phishing Scam!

November 21st, 2022 | by
Laptop in front of orange background with incoming e-mail

Source: Own illustration

The way we work together has changed fundamentally in recent years. Among the major changes is the shift of work processes to the home office. Not only have everyday tasks had to be shifted into virtual space, but also the entire communication process. This is how online meetings and video conferencing became a central part of our working lives. The digitization of these work processes brings many benefits. However, it also confronts many companies and organizations with major challenges. One of these challenges is the drastic increase in cyber attacks. As is so often the case, Internet fraudsters have taken advantage of the new situation and quickly developed a variety of new types of fraud methods. These include, for example, phishing attempts via appointment invitations.

Read the rest of this entry »

Gamification meets IT Security

October 31st, 2022 | by
Symbol image for gamification

Source: Own illustration

When dealing with information technology, a whole range of dangers may lurk. In this context, the “human factor” is often presented as a particularly large and important challenge. Ignorance, naivety and a lack of caution are the most common causes of so-called insider threats. Experts agree on one thing: IT security can only be as good as the people who operate the systems.

For a security concept to be implemented successfully, it first has to be understood by the users. IT security awareness training courses are often used for this purpose. These are designed to strengthen the general understanding of security and to illustrate concrete risks. One of the most important strategies here is called gamification. Read the rest of this entry »

Honeypot – How to Lure Cyber Criminals

October 7th, 2022 | by
Honey

Source: Freepik

Sometimes the best defence is a strong offensive. When it comes to IT security, the demand for offensive security measures is greater than ever. These often rely on techniques and approaches that are actually used by criminal hackers to lure user into traps. But attackers themselves can also be tricked into a trap. Honeypots are not only used to attract bears. They can also be used to catch cybercriminals in the act. In this article, we will explain what a honeypot is and how it can be used to increase IT security. Read the rest of this entry »