{"id":13310,"date":"2022-11-30T09:00:44","date_gmt":"2022-11-30T08:00:44","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=13310"},"modified":"2022-11-29T16:28:29","modified_gmt":"2022-11-29T15:28:29","slug":"computer-security-day","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2022\/11\/30\/computer-security-day\/","title":{"rendered":"Computer Security Day: 5 Simple Tips to Improve IT Security"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_13310 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_13310')){$('.twoclick_social_bookmarks_post_13310').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2022\\\/11\\\/30\\\/computer-security-day\\\/\",\"post_id\":13310,\"post_title_referrer_track\":\"Computer+Security+Day%3A+5+Simple+Tips+to+Improve+IT+Security\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_13311\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13311\" class=\"size-medium wp-image-13311\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day-300x169.png\" alt=\"IT security symbols: cloud, magnifying glass, fingerprint, keyhole, email, cryptographic key\" width=\"300\" height=\"169\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day-300x169.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day-1024x576.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day-768x432.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day-1536x864.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2022\/11\/IT-Center-Blog-Computer-Security-Day.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-13311\" class=\"wp-caption-text\">Source: Own Illustration<\/p><\/div><\/p>\n<p>For most people, life without the Internet has long been unimaginable. Whether at home, at work or anywhere along the way &#8211; information technology is simply everywhere. However, its ubiquity also raises the question of its security. A question that experts already asked themselves back when the Internet had only just begun to develop. Since 1988, November 30 has been dedicated to IT security in many countries. The aim of this event is to raise general awareness of IT security and to educate users on the subject. To mark the occasion, we have compiled five very simple tips for more IT security in everyday life.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #00549f;\">The Browser as Entrance Gate<\/span><\/h3>\n<p>The browser is our window to the web and is considered the biggest gateway for viruses and other threats. If you want to surf the web safely, you should pay attention to a few things when it comes to choosing your browser and visiting websites.<\/p>\n<p>When choosing your browser, make sure that the software is being regularly updated. You should also take a look at the browser&#8217;s security settings. Popular browsers have integrated phishing and malware protections. You should definitely activate them. You can also automatically disable the use of active content when visiting unknown websites via the browser&#8217;s security settings.<\/p>\n<p><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/08\/23\/sichere-webseiten\/\">Trustworthy websites<\/a> can be recognized, among other things, by the fact that they use SSL certificates for encryption. You can tell whether your browser has been able to establish an encrypted connection with the website you are visiting by the fact that the URL begins with &#8220;https&#8221;. If this encryption is missing, the website is considered insecure and represents a high security risk. However, malware can be caught not only on dubious websites. Even supposedly trustworthy websites can be used by cybercriminals to spread malware even more effectively.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Regular Updates<\/span><\/h3>\n<p>Software updates are one of the fundamental pillars of IT security. They serve to improve and, above all, protect systems. They are intended to fix any bugs in a software and close security gaps. That is why they are one of the most effective means of defending against attacks online. Updates should always be installed as soon as possible, so that the systems can always be protected against new threats. Operating systems and all software, such as browsers, should be updated on a regular basis. Many systems offer automatic updates. This will ensure the latest version is always installed.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">The Thing with Passwords<\/span><\/h3>\n<p>If you want to protect your data, you will need secure passwords that are not easy to crack. Such a password should consist of at least 10 characters. A combination of upper and lower case letters and the use of numbers and special characters also increase the level of security of the password. Login data that contains personal information, such as names or dates of birth, is considered particularly insecure.<\/p>\n<p>In addition, it is often not advisable to carelessly save passwords in the browser. Saving passwords can pose a security risk under certain circumstances, as browsers can also have security gaps. You can increase your protection by managing your login data with the help of a password manager. A password manager stores and encrypts the data in such a way that it cannot be read by cybercriminals. Some browsers come with their own built-in password manager.<\/p>\n<p>If you want to protect your online accounts even better, you should use two-factor authentication wherever you can. As soon as a user logs in, a one-time code is sent to him or her, for example, as an SMS or generated by an app. Both the password and this unique code are required for a successful login.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Backing Up<\/span><\/h3>\n<p>Unfortunately, we don&#8217;t always manage to protect all our data from attacks or simply from sudden hardware failure. No matter if the hard disk fails or if we fall victim to ransomware, there is one thing that will save us in the worst case: <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/12\/27\/backup\/\">backups<\/a>! Users have a variety of backup options at their disposal. For example, backups can be created automatically or manually. The data can be stored either physically, for example on an external hard drive, or online. Backups should be made regularly to prevent data loss as effectively as possible.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">The Human Firewall<\/span><\/h3>\n<p>The level of security of a system is always only as good as the person operating it. This is characterized by the fact that a large proportion of security incidents are due to human error. However, the human factor should not be seen as a security risk, but rather as an opportunity. The greater the security awareness, the greater the likelihood that a cyberattack can be prevented. It is therefore particularly important to strengthen this security awareness and to sensitize users to security risks.<\/p>\n<p>Join us in becoming part of our human firewall. You can find all our blog posts on the topic of security in dealing with information technology under the tag <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/tag\/it-sicherheit\/\">IT security<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/IT-Center\/Team\/~epvp\/Mitarbeiter-CAMPUS-\/?gguid=0x2C5E1B0A3DA32A45AB293A42E93EEC07&amp;allou=1&amp;lidx=1\">St\u00e9phanie Bauens<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":4530,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[311,314],"tags":[64,624,81,61,67,721],"class_list":["post-13310","post","type-post","status-publish","format-standard","hentry","category-fun-facts","category-it-sicherheit","tag-backup","tag-firewall","tag-it-security","tag-it-sicherheit","tag-passwoerter","tag-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/13310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/4530"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=13310"}],"version-history":[{"count":15,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/13310\/revisions"}],"predecessor-version":[{"id":13326,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/13310\/revisions\/13326"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=13310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=13310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=13310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}