Categories
Pages
-

IT Center Blog

Schlagwort: ‘Sicherheit’

Network Renewal: From Project to Regular Operation

July 7th, 2025 | by
a network server rack with neatly arranged blue Ethernet cables connected to several patch panels and network devices

Source: Own Illustration

After several years of intensive planning and implementation work, the network renewal at RWTH Aachen University is approaching an important milestone: Since its launch in 2018, the finish line for the end of 2026 is slowly coming into view. You can also read about our interim status in 2022 in our previous blog article.  The completion of the measures in the individual university buildings marks the transition from project to regular operation. The aim of the network renewal is to modernize the communication infrastructure, which is in some parts severely outdated, and to put it on a future-proof footing—technically, organizationally, and operationally.

Read the rest of this entry »

How to Set up a Secure Home Network

May 14th, 2025 | by
Illustration of a laptop displaying a login screen, surrounded by icons for internet, Wi-Fi, data sharing, media, and a security shield with a padlock.

Source: Freepik

More and more devices in our everyday lives are connected to the internet – from home offices and online banking to smart thermostats and surveillance cameras. And all these digital helpers access a common system: the home network. It forms the heart of our digital infrastructure at home. In this article, we explain what a home network is, what risks it poses, and how you can effectively protect it from attacks.

 

Read the rest of this entry »

Which Browser Is the Most Secure?

February 12th, 2025 | by

To mark Safer Internet Day, we want to raise awareness of online safety and help you to better protect your digital environment. In an increasingly digitalized world where online security is becoming more and more important, choosing the right browser is a crucial step in protecting yourself from cybercrime and unwanted access. But which browser is the most secure? In this article, we have done some research and provide you with an overview of the most popular browsers and their security features. You can also read our previous article to find out more about internet security.

Read the rest of this entry »

Zero-Day Vulnerabilities

January 17th, 2025 | by

Source: Own Illustration

Imagine working every day on a computer that seems to run smoothly. Everything works as usual – until one day a security problem is discovered that nobody knew about. Suddenly, a security vulnerability is discovered that attackers have known about for weeks or even months and taken advantage of undetected. This type of vulnerability is known as a zero-day vulnerability. In this blog post, we’ll explore what exactly zero-day vulnerabilities are, why they are particularly dangerous and how best to deal with them.

Read the rest of this entry »

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »

Types of Firewalls

October 16th, 2024 | by
Firewall

Source: Freepik

In the first part of our blog series, we covered the basics of firewalls: what they are, how they work, and why they are essential for network security. Today, we will take a closer look at the different types of firewalls used in IT-Security.

 

Read the rest of this entry »

The Role of Firewalls in Network Security

August 21st, 2024 | by
chart network security

Source: Freepik

In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »

Ethical Hacking: Hacking for More Security

July 19th, 2024 | by
A woman focused on computer code, engaged in hacking activities.

Source: Freepik

Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.

 

Read the rest of this entry »

Ethical Decision-Making in IT

May 17th, 2024 | by
Vector pointing to a scale

Source: Freepik

From automated decision-making to data protection and privacy issues, technological developments have a significant impact on society. Today, information and communication technologies have become a matter of course and indispensable in all areas of life. Ethics has long been an issue in business and the world of IT is also increasingly concerned with moral issues. In the context of artificial intelligence (AI) in particular, such conflicts are becoming increasingly prominent. In today’s blog post, we want to shed light on ethical influences in the IT sector.

Read the rest of this entry »

World Backup Day: Security Through Data Backup

March 27th, 2024 | by
Person holding laptop with cloud icons in background

Source: Freepik

March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.

Read the rest of this entry »