{"id":17274,"date":"2023-09-25T14:55:22","date_gmt":"2023-09-25T12:55:22","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=17274"},"modified":"2025-02-24T11:08:59","modified_gmt":"2025-02-24T10:08:59","slug":"it-maerchenstunde-teil-2","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2023\/09\/25\/it-maerchenstunde-teil-2\/","title":{"rendered":"IT Fairytale Hour &#8211; Part 2"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_17274 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_17274')){$('.twoclick_social_bookmarks_post_17274').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2023\\\/09\\\/25\\\/it-maerchenstunde-teil-2\\\/\",\"post_id\":17274,\"post_title_referrer_track\":\"IT+Fairytale+Hour+%26%238211%3B+Part+2\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_17281\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-17281\" class=\"wp-image-17281 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-300x200.jpg\" alt=\"Animated woman woman looking through a magnifying glass comparing myths with facts. \" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-300x200.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-1024x683.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-768x512.jpg 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-1536x1024.jpg 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2023\/09\/61Z_2112.w009.n001.65B.p14.65-1-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-17281\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/de.freepik.com\/vektoren-kostenlos\/frau-die-durch-die-lupe-schaut-und-zwischen-mythen-und-fakten-vergleicht_21458056.htm#query=mythen&amp;position=0&amp;from_view=search&amp;track=sph\">Freepik<\/a><\/p><\/div><\/p>\n<p>Today we continue with our series, &#8220;All about the myths in the world of IT&#8221;.<br \/>\nIf you missed the first part of the myths, feel free to check out our <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2023\/08\/23\/it-maerchenstunde-was-ist-dran-an-den-mythen\/\">last post<\/a>.<\/p>\n<p>&#8220;The full moon causes sleepless nights&#8221; &#8211; a myth we all know. Experts have long since proven that the moon does not have magical powers. The brightness releases less melatonin in the brain, which helps us fall asleep.<br \/>\nSo it&#8217;s worth taking another close look at widespread half-truths.<\/p>\n<p>In the world of IT, there are myths that we can get to the bottom of together.<br \/>\nToday, it&#8217;s all about IT security and what you should know about it.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #00549f;\"><strong>Myth #3: The Perfect Password doesn&#8217;t Exist!<\/strong><\/span><\/h3>\n<p>Again and again we are faced with the task of choosing a password &#8211; a password that should be strong, unique and yet easy to remember.<\/p>\n<p>But does the perfect password even exist? Many believe that there is no such thing and that all passwords can eventually be cracked. It&#8217;s true, no password is absolutely secure. But there are definitely ways to increase the security of your accounts.<\/p>\n<p>A strong password consists of a combination of upper and lower case letters, numbers and special characters. Also, long passwords are more secure because they are harder to guess or crack.<br \/>\nHowever, even the strongest password won&#8217;t do you any good if you use it on insecure websites or reveal it to other people. It&#8217;s important to use different passwords for different accounts and change them regularly.<\/p>\n<p>Another helpful way to secure your online accounts is to use two-factor authentication (2FA) or multi-factor authentication (MFA). This extra layer of security makes it harder to access your accounts, even if the password is known. You can read more about what multi-factor authentication means and how it works in our <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2021\/05\/05\/die-multi-faktor-authentifizierung\/\">blog post<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Myth #4: Click Here to Win! The Magic Links!<\/span><\/h3>\n<p>You&#8217;re probably familiar with them &#8211; tempting links that promise you to win great prizes or discover incredible offers. But be careful, because not all links lead to valuable treasures.<\/p>\n<p>Some links may lead you to dangerous websites that contain malware or try to steal your personal information. Such links are often used in phishing emails that pretend to come from trusted sources.<br \/>\nSo, before you click on a link, make sure that it comes from a trusted source. Watch out for suspicious email addresses, spelling mistakes, or unusual requests. If something seems strange to you, it&#8217;s better not to click on the link.<\/p>\n<p>Another safe way to check links is to hover your mouse over the link without clicking on it. Most email clients or web browsers will then show you the actual URL that is hidden behind the link. This way you can see if the link really takes you where you want to go.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Myth #5: Public WLAN &#8211; A Risky Adventure?<\/span><\/h3>\n<p>We often find open Wi-Fi networks in cafes, airports, hotels and other public places.<br \/>\nHowever, some avoid public WLAN networks because they believe they are a haven for hackers. But is that really the case?<\/p>\n<p>Public WLANs can indeed be insecure, as they are often unencrypted and allow hackers to intercept traffic. But that doesn&#8217;t mean you have to avoid them completely.<\/p>\n<p>To surf public WLANs safely, you can use a VPN connection. A VPN connection encrypts your data traffic and protects you from prying eyes. Also, you should avoid sensitive information like passwords or bank details when you are connected to public networks. There is a bit of truth in this myth, but as is often the case, it&#8217;s important to be cautious and careful, rather than letting fear and insecurity guide our actions. By taking your own protective measures and being vigilant, you can also surf safely in the world of public Wi-Fi and enter the digital fairy tale world with ease.<\/p>\n<p>With that, we&#8217;ve been through another exciting IT fairytale lesson. But the journey continues!<br \/>\nLet us know your questions and thoughts, and we look forward to uncovering and clearing up more myths for you in the next part of our IT Fairytale Hour.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is Jula Hegeler<u>.<\/u><\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":4285,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[311,312,314,315],"tags":[712,298,81,984,529,68,1002,866,148,728],"class_list":["post-17274","post","type-post","status-publish","format-standard","hentry","category-fun-facts","category-insight-it-center","category-it-sicherheit","category-services-support","tag-fakten","tag-it","tag-it-security","tag-mythen","tag-nice-to-know","tag-passwort","tag-security","tag-sicherheit","tag-tipps","tag-wlan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/17274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/4285"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=17274"}],"version-history":[{"count":13,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/17274\/revisions"}],"predecessor-version":[{"id":21490,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/17274\/revisions\/21490"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=17274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=17274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=17274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}