Schlagwort: ‘IT-Security’
Backdoors: Access Through an Alternative Access Point

Source: Pixabay
In life, sometimes it can be very useful to have a plan B or to keep a backdoor open. But would you leave your house and hide the keys to the backdoor under the doormat? For burglars, this setup would probably be an easy target. In IT as well, so-called backdoors are a very popular target for hackers. However, these backdoors are much more tricky and discreet than an open door or hidden keys under a doormat. Because even when the original breach of security, such as an open window, no longer exists, cybercriminals can still get in and out as they please via the implemented backdoor.
Cyber-Security-Awareness-Training at RWTH Aachen University

Source: Pixabay
Due to the increasing number of cyber attacks, which are also targeting universities and other institutions, RWTH Aachen University has been conducting an internal phishing simulation to increase cyber security awareness with the help of the security company SoSafe GmbH since December 06, 2021.
Zero Day Exploit Log4Shell

Source: Pixabay
On December 10, 2021, an extremely critical, since trivially exploitable, vulnerability (Log4Shell) in the standard library Log4J became public. Since it became known, hackers and security experts have been racing against time. “Successful exploitation of the vulnerability could lead to a complete takeover of the affected system,” warned Arne Schönbohm, President of the German Federal Office for Information Security (BSI).
Data backup made easy

Source: Unsplash
With the year 2021 nearing its end, a whole new year full of possibilities is about to begin. Once again, the time has come for some good resolutions. This year has clearly shown us how essential a good IT infrastructure is. Day after day, huge amounts of data are created, processed and shared, both privately and professionally. But what if this data unexpectedly disappears? While many people may be aware of the danger of data loss, only a few actively take precautions to protect their data from such a loss in a private context. Frequent backups aim to prevent data loss and are an essential aspect of IT security.
Single sign-on: What does that actually mean?

Source: Pixabay
Our everyday life is closely accompanied by the internet. We communicate with our peers on the net, share memories on social media, we shop online, search for answers to various questions in forums and much more. All these services usually require a login via username and password. With intensive use of various online services, it is sometimes easy to lose track of everything. This can often lead to downright password chaos. Single Sign-On (SSO) is intended to remove or precisely prevent this chaos. Read the rest of this entry »
“Keep Your Hard Drive” – Data security, a must!
Whether on the work computer, drives or the copier, IT managers in companies, but also each individual employee, have to deal with a lot of data at work. When data media need to be repaired or replaced, we sometimes carelessly hand them over. This also applies to our private PCs at home. But be careful in this matter! We give you tips on how to handle your data media with care and thus ensure greater data security.

Many devices, many data – Keep an eye on your data!
Source: Pixabay
IT Security Awareness: Increasing Consciousness for IT Security

Source: Pixabay
Computers have become an indispensable part of our everyday lives. Whether at work or during leisure time, information technology often facilitates our daily lives. Every day and at any time, we surf the internet and provide various institutions with our personal data. Cyberattacks too are becoming more frequent and often cause great damage, not only to the individual user, but also to entire companies and institutions. It is of great importance to protect those sensitive data from being stolen and misused.
Macros – Our Measures For Your Security

Photo: Freepik
***Change of editorial department on 02.11.2021***
E-mails are often misused for phishing attempts and to spread malware. Especially emails with file attachments should be checked critically. In our first article on macros, we explained what macros are and why they can be dangerous. In today’s article, you will learn what precautions are now being taken, what alternative options are available for sending documents, and what precautions you can take to protect yourself from files with dangerous macros. Read the rest of this entry »
How can I recognize trustworthy websites?

Source: Pixabay
Surfing the Internet is part of our everyday lives. Both in our private lives and at work, we are using the World Wide Web. We visit websites to inform ourselves, to communicate and even to shop. In the process, data from your own device will automatically be transferred to the website you are visiting and vice versa. When surfing, you should therefore critically inspect every website you visit. Just like in the real world, there are safe places on the Internet and places that you should avoid for your own safety. Nevertheless, how can you judge a website correctly and how can you distinguish between a trustworthy and an untrustworthy website? The following criteria should help you! Read the rest of this entry »
The RWTH email address – your faithful companion to stay up to date

Source: Pixabay
To avoid chaos, in this article we summarize what the RWTH email address is and what else you need to keep in mind around it. Read the rest of this entry »


