Categories
Pages
-

IT Center Blog

Schlagwort: ‘SafetyFirst’

The IT Center’s IT Security Measures

September 2nd, 2022 | by
Falling dominoes

Source: Freepik

With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH – a Review

August 15th, 2022 | by
Padlock in front of world map

Source: Pixabay

No more simulated phishing emails in your inbox? No more access to the eLearning program for employees of the RWTH? That can only mean one thing: the cyber security awareness training at RWTH Aachen University ended for the time being on May 09, 2022.

Today we look back on the training and share the results with you. Read the rest of this entry »

Shadow IT: The Underestimated Danger

July 22nd, 2022 | by
Laptop in the Dark

Source: Unsplash

The application of information technology is as diverse as the world around us. IT solutions have now taken a major part in our daily lives. They provide support in our households, assist us during sports and in our leisure activities, and are often a great help in our professional activities as well. This increasing digital affinity offers numerous advantages, but also bears risks. The use of so-called shadow IT in a professional context is growing along with it. Now, what is shadow IT exactly? What opportunities and risks does it hold, and how can a company reduce the use of shadow IT in the best possible way? This article will give you all the answers to these questions. Read the rest of this entry »

CEO Fraud: When “Superiors” ask for Money

June 27th, 2022 | by
Symbol image of CEO Fraud

Source: Pixabay

Online fraud schemes are constantly evolving and becoming more devious. In some cases, it can be extremely difficult to spot the scam. Yet one particular fraud method seems to be growing in popularity in recent years and, more importantly, causing ever greater damage: the CEO Fraud. In this article, we’ll explain exactly how this method works and how you can protect yourself from it. Read the rest of this entry »

Insider Threat: The Threat from Within

May 16th, 2022 | by
Person in front of monitor

Source: Pixabay

In an increasingly digitalized world, cyber threats are playing an ever greater role. The pandemic and working at home also favor these threats. In the last two years, the number of cyber attacks has increased sharply. This is also confirmed by a study by EY (german only). The human factor plays a major role in this context. But what if the threat itself comes from within the company’s own ranks? So-called insider threats are often underestimated by many companies and organizations. Yet the effects of such a threat can be devastating. Read the rest of this entry »

Macros – E-mail Filtering at RWTH

March 25th, 2022 | by
Screen with 2 ladybugs, gear and envelope

Source: Pixabay

E-mails are a major gateway for cyberattacks. These attacks are no longer isolated incidents and are part of our everyday life. Especially the spreading of malware through attached documents with macros are very popular among cyber criminals. These macros can for example contain hidden malware. If the recipient activates these macros when opening the document, any malicious software they may contain can cause great damage. For this reason, a protection mechanism for e-mail macro filtering was installed for the RWTH e-mail service on November 16, 2021. Office documents are the most used, but also PDFs, e.g. containing form fields. Read the rest of this entry »

SQL Injection: Databases Attacks

March 23rd, 2022 | by
Medical syringe

Source: Pixabay

Database systems are essential in many aspects. They allow large amounts of data to be organized, read and stored for the long term. The field of application of database systems is vast and so is the amount of personal data stored in them. For example, banks and insurance companies use databases to structure and store account information and information relating to accounting transactions. Every time we search for a product in a web store, we access a specific database, and our user data, such as login information, is also stored in databases. At best, these sensitive data are encrypted. The effort required to build and maintain these electronic databases is great – but the biggest challenge is to ensure their security. One of the greatest threats to these databases and the data they contain are so-called code injections. Read the rest of this entry »

Vishing: Stealing data on the phone

March 2nd, 2022 | by
Smartphone

Source: Pixabay

Cyber-attacks are not just part of everyday life in companies. Even when opening our private e-mail inboxes, we occasionally encounter peculiar e-mails suggesting that the addressee is required to take urgent action. The e-mail urges the addressee to update personal data, enter account information for the payout of a reward, or click on links. Phishing is no longer unknown among fraud methods. However, the attacks are becoming more and more elaborate. Somewhat less known and therefore more surprising, however, are so-called vishing attacks. Fraudsters are coming up with a lot of new ways to obtain data from their victims. Read the rest of this entry »

IT-Security and the Internet of Things

February 11th, 2022 | by
Graphical representation of IoT

Source: Pixabay

The number of smart technologies seeing the light of day is growing steadily. Any everyday problem either gets its own smart solution or becomes at least supported by new technologies. The Internet is all around and supports us in every single aspect of our lives. By now, even our coffee machines are connected to our smartphone and ensures that our coffee is already waiting for us in the kitchen while we are still sitting at our desk. The so-called Internet of Things has countless advantages and is rightly referred to as the 4th Industrial Revolution. What exactly lies behind this term, what are the risks, and how can we avoid them? Read the rest of this entry »

Safer Internet Day 2022 – Together for a better Internet

February 7th, 2022 | by
Logo vom Safer Internet Day

We support the Safer Internet Day. Do you?
Source: Saferinternet

How safe is our use of the Internet? That is not an easy question to answer. Some risks we are aware of, but others are often completely underestimated. Whether one’s own use of the Internet is really safe is usually only noticed, if at all, when it is already too late. Therefore, it is particularly important to raise awareness of the risks and emerging concerns about using the Internet. From cyberbullying to social media use or digital identity, every year the international Safer Internet Day (SID) aims to raise awareness about Internet safety. Read the rest of this entry »