Categories
Pages
-

IT Center Blog

Schlagwort: ‘IT-Security’

Attention: Spear Phishing Emails in Circulation

September 30th, 2022 | by
Arrow through laptop

Source: Own illustration

In the last weeks, there have been more spear phishing attacks on RWTH email addresses. In this article, we would like to make you aware of these attacks and explain how you can recognize spear phishing emails. You have received a spear phishing email to your RWTH email address? We explain how you should best proceed. Read the rest of this entry »

E-Mail Security – Why Are Redirections Bad?

September 7th, 2022 | by
Illustration mail correspondence

Source: Freepik

The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.

In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.

 

 

Read the rest of this entry »

The IT Center’s IT Security Measures

September 2nd, 2022 | by
Falling dominoes

Source: Freepik

With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »

Artificial Intelligence – Curse or Blessing for IT Security?

August 29th, 2022 | by
Concept of digital transformation of the brain of AI technology

Source: Freepik

We are increasingly coming across the term “artificial intelligence” (AI). Whenever we come across this term that has become a fashionable phenomenon in the media, there are regularly reports about self-thinking AI, fully autonomous means of transport or other similar applications. For many of us, it can be hard to figure out what is actually meant by the term. However, the application areas of AI that seem to be particularly popular in the media are in reality only a very small segment of the actual application field of AI. Many a user would probably even be surprised to know in which areas AI is already being implemented today. In this article, we would like to take a closer look at the term and explain what role artificial intelligence can play in the field of IT security.

Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH – a Review

August 15th, 2022 | by
Padlock in front of world map

Source: Pixabay

No more simulated phishing emails in your inbox? No more access to the eLearning program for employees of the RWTH? That can only mean one thing: the cyber security awareness training at RWTH Aachen University ended for the time being on May 09, 2022.

Today we look back on the training and share the results with you. Read the rest of this entry »

E-Mail Security – The SMTP Protocol and Its Problems (Sending and Receiving)

July 27th, 2022 | by
 Technical graphic for receiving and sending e-mails

Source: Freepik

In our first article on the topic of e-mail security, we gave an insight into the historical development of e-mail. We briefly explained how e-mail exchange works and referred to the statistics of the e-mail service at RWTH Aachen University.

Today we’ll tell you about the transmission protocol “Simple Mail Transfer Protocol” (SMTP) and its pitfalls.

Read the rest of this entry »

Shadow IT: The Underestimated Danger

July 22nd, 2022 | by
Laptop in the Dark

Source: Unsplash

The application of information technology is as diverse as the world around us. IT solutions have now taken a major part in our daily lives. They provide support in our households, assist us during sports and in our leisure activities, and are often a great help in our professional activities as well. This increasing digital affinity offers numerous advantages, but also bears risks. The use of so-called shadow IT in a professional context is growing along with it. Now, what is shadow IT exactly? What opportunities and risks does it hold, and how can a company reduce the use of shadow IT in the best possible way? This article will give you all the answers to these questions. Read the rest of this entry »

CEO Fraud: When “Superiors” ask for Money

June 27th, 2022 | by
Symbol image of CEO Fraud

Source: Pixabay

Online fraud schemes are constantly evolving and becoming more devious. In some cases, it can be extremely difficult to spot the scam. Yet one particular fraud method seems to be growing in popularity in recent years and, more importantly, causing ever greater damage: the CEO Fraud. In this article, we’ll explain exactly how this method works and how you can protect yourself from it. Read the rest of this entry »

E-Mail Security – E-Mail & Mail Statistics at RWTH

June 15th, 2022 | by
Paper with @-Sign

Source: Freepik

About 50 years ago, the first e-mail was sent – albeit between two computer systems that were part of the same local network. In the 1980s, the internet was opened up to a larger circle of users and e-mail was given its own transmission protocol “Simple Mail Transfer Protocol” (SMTP).

Even today, the exchange of messages via e-mail is undoubtedly an important way of exchanging information between parties via an asynchronous communication channel.

Read the rest of this entry »

Insider Threat: The Threat from Within

May 16th, 2022 | by
Person in front of monitor

Source: Pixabay

In an increasingly digitalized world, cyber threats are playing an ever greater role. The pandemic and working at home also favor these threats. In the last two years, the number of cyber attacks has increased sharply. This is also confirmed by a study by EY (german only). The human factor plays a major role in this context. But what if the threat itself comes from within the company’s own ranks? So-called insider threats are often underestimated by many companies and organizations. Yet the effects of such a threat can be devastating. Read the rest of this entry »