Categories
Pages
-

IT Center Blog

Schlagwort: ‘SafetyFirst’

CEO Fraud: When “Superiors” ask for Money

June 27th, 2022 | by
Symbol image of CEO Fraud

Source: Pixabay

Online fraud schemes are constantly evolving and becoming more devious. In some cases, it can be extremely difficult to spot the scam. Yet one particular fraud method seems to be growing in popularity in recent years and, more importantly, causing ever greater damage: the CEO Fraud. In this article, we’ll explain exactly how this method works and how you can protect yourself from it. Read the rest of this entry »

Insider Threat: The Threat from Within

May 16th, 2022 | by
Person in front of monitor

Source: Pixabay

In an increasingly digitalized world, cyber threats are playing an ever greater role. The pandemic and working at home also favor these threats. In the last two years, the number of cyber attacks has increased sharply. This is also confirmed by a study by EY (german only). The human factor plays a major role in this context. But what if the threat itself comes from within the company’s own ranks? So-called insider threats are often underestimated by many companies and organizations. Yet the effects of such a threat can be devastating. Read the rest of this entry »

Macros – E-mail Filtering at RWTH

March 25th, 2022 | by
Screen with 2 ladybugs, gear and envelope

Source: Pixabay

E-mails are a major gateway for cyberattacks. These attacks are no longer isolated incidents and are part of our everyday life. Especially the spreading of malware through attached documents with macros are very popular among cyber criminals. These macros can for example contain hidden malware. If the recipient activates these macros when opening the document, any malicious software they may contain can cause great damage. For this reason, a protection mechanism for e-mail macro filtering was installed for the RWTH e-mail service on November 16, 2021. Office documents are the most used, but also PDFs, e.g. containing form fields. Read the rest of this entry »

SQL Injection: Databases Attacks

March 23rd, 2022 | by
Medical syringe

Source: Pixabay

Database systems are essential in many aspects. They allow large amounts of data to be organized, read and stored for the long term. The field of application of database systems is vast and so is the amount of personal data stored in them. For example, banks and insurance companies use databases to structure and store account information and information relating to accounting transactions. Every time we search for a product in a web store, we access a specific database, and our user data, such as login information, is also stored in databases. At best, these sensitive data are encrypted. The effort required to build and maintain these electronic databases is great – but the biggest challenge is to ensure their security. One of the greatest threats to these databases and the data they contain are so-called code injections. Read the rest of this entry »

Vishing: Stealing data on the phone

March 2nd, 2022 | by
Smartphone

Source: Pixabay

Cyber-attacks are not just part of everyday life in companies. Even when opening our private e-mail inboxes, we occasionally encounter peculiar e-mails suggesting that the addressee is required to take urgent action. The e-mail urges the addressee to update personal data, enter account information for the payout of a reward, or click on links. Phishing is no longer unknown among fraud methods. However, the attacks are becoming more and more elaborate. Somewhat less known and therefore more surprising, however, are so-called vishing attacks. Fraudsters are coming up with a lot of new ways to obtain data from their victims. Read the rest of this entry »

IT-Security and the Internet of Things

February 11th, 2022 | by
Graphical representation of IoT

Source: Pixabay

The number of smart technologies seeing the light of day is growing steadily. Any everyday problem either gets its own smart solution or becomes at least supported by new technologies. The Internet is all around and supports us in every single aspect of our lives. By now, even our coffee machines are connected to our smartphone and ensures that our coffee is already waiting for us in the kitchen while we are still sitting at our desk. The so-called Internet of Things has countless advantages and is rightly referred to as the 4th Industrial Revolution. What exactly lies behind this term, what are the risks, and how can we avoid them? Read the rest of this entry »

Safer Internet Day 2022 – Together for a better Internet

February 7th, 2022 | by
Logo vom Safer Internet Day

We support the Safer Internet Day. Do you? (Source: Saferinternet.org)

How safe is our use of the Internet? That is not an easy question to answer. Some risks we are aware of, but others are often completely underestimated. Whether one’s own use of the Internet is really safe is usually only noticed, if at all, when it is already too late. Therefore, it is particularly important to raise awareness of the risks and emerging concerns about using the Internet. From cyberbullying to social media use or digital identity, every year the international Safer Internet Day (SID) aims to raise awareness about Internet safety. Read the rest of this entry »

Cyber-Security-Awareness-Training at RWTH Aachen University

January 10th, 2022 | by
Mouse pointer on lettering Security

#safetyfirst (Source: Pixabay)

Due to the increasing number of cyber attacks, which are also targeting universities and other institutions, RWTH Aachen University has been conducting an internal phishing simulation to increase cyber security awareness with the help of the security company SoSafe GmbH since December 06, 2021.

Read the rest of this entry »

Data backup made easy

December 27th, 2021 | by
External hard drive

A popular backup method is to save data on an external hard drive. (Source: Unsplash)

With the year 2021 nearing its end, a whole new year full of possibilities is about to begin. Once again, the time has come for some good resolutions. This year has clearly shown us how essential a good IT infrastructure is. Day after day, huge amounts of data are created, processed and shared, both privately and professionally. But what if this data unexpectedly disappears? While many people may be aware of the danger of data loss, only a few actively take precautions to protect their data from such a loss in a private context. Frequent backups aim to prevent data loss and are an essential aspect of IT security.

Read the rest of this entry »

IT Security Awareness: Increasing Consciousness for IT Security

November 17th, 2021 | by
Logo Cyber Security

Source: Pixabay

Computers have become an indispensable part of our everyday lives. Whether at work or during leisure time, information technology often facilitates our daily lives. Every day and at any time, we surf the internet and provide various institutions with our personal data. Cyberattacks too are becoming more frequent and often cause great damage, not only to the individual user, but also to entire companies and institutions. It is of great importance to protect those sensitive data from being stolen and misused.

Read the rest of this entry »