{"id":18513,"date":"2024-02-14T12:00:18","date_gmt":"2024-02-14T11:00:18","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=18513"},"modified":"2024-02-09T08:54:04","modified_gmt":"2024-02-09T07:54:04","slug":"romantik-ohne-risiko-it-sicherheit","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/02\/14\/romantik-ohne-risiko-it-sicherheit\/","title":{"rendered":"Romance Without Risk: IT Security"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_18513 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_18513')){$('.twoclick_social_bookmarks_post_18513').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2024\\\/02\\\/14\\\/romantik-ohne-risiko-it-sicherheit\\\/\",\"post_id\":18513,\"post_title_referrer_track\":\"Romance+Without+Risk%3A+IT+Security\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_18519\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-18519\" class=\"size-medium wp-image-18519\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-300x200.png\" alt=\"Two vectors hugging\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-300x200.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-1024x683.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-768x512.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-1536x1024.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2048x1365.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-18519\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/de.freepik.com\/vektoren-kostenlos\/in-liebe-illustration-konzept_6195512.htm#query=love&amp;position=33&amp;from_view=search&amp;track=sph&amp;uuid=de00afcd-e215-4d9f-906a-754a61f61680\">Freepik<\/a><\/p><\/div><\/p>\n<p>Valentine&#8217;s Day, a time of love and affection, brings with it not only romantic gestures but also potential online threats. In a world where digital connections are just as important as personal relationships; it is crucial to protect your own data.<\/p>\n<p>In this article, you can find out how to order flowers online, buy Valentine&#8217;s Day gifts and use online dating platforms while staying digitally safe. Take care, friends!<\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #00549f;\">Sincerely Protected<\/span><\/h3>\n<p>Phishing and so-called &#8220;love scamming&#8221; are widespread phenomena in which unknown online acquaintances pose a potential security risk. The scam consists of abusing certain needs, such as love, in order to obtain money. Especially in the run-up to Valentine&#8217;s Day, phishing and love scamming are on the rise! You can read more about identity deception by cyber criminals in our blog post on <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2023\/12\/27\/social-engineering-tauschung-im-cyberraum\/\">social engineering<\/a>.<\/p>\n<div id=\"attachment_18514\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-18514\" class=\"size-medium wp-image-18514\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2-300x200.png\" alt=\"Statistic on Valentine's Day\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2-300x200.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2-1024x683.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2-768x512.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2-1536x1024.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/02\/Blog-Layout-2-2048x1365.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-18514\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/whats-love-got-to-do-with-it-4-in-5-valentines-day-themed-spam-emails-are-scams-bitdefender-antispam-lab-warns\/\">Bitdefender<\/a><\/p><\/div>\n<p>On social media, it is important to pay particular attention to trustworthy companies and to protect your own sensitive data. Examples of this include only taking part in competitions with reputable and verified companies or websites. We therefore recommend that you do not disclose any personal information in public forums and be careful when receiving enquiries from unknown contacts.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Encrypted Love<\/span><\/h3>\n<p>For additional data protection, we recommend using a VPN to secure your online communication. You can find all the facts you need about VPN on IT Centre Help. The aim here is to be able to<\/p>\n<p>access the RWTH network remotely but securely, as if you were on site. We also recommend regularly updating your security software, as regular updates and patches create the basis for a secure digital space. A tip for our lovebirds at work: there should be clear guidelines for dealing with romantic content in the workplace in order to maintain data protection and professionalism. Encrypted messaging services help to protect private communication.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Shopping with Love<\/span><\/h3>\n<p>When sending online gifts, it is important to ensure secure shipping and use trusted platforms. Use verified online gift services or reputable retailers to ensure the integrity of your digital gifts. Make sure you only disclose personal information such as credit card details on encrypted and secure websites.<\/p>\n<p>Preferably use payment methods with additional security, such as payments via PayPal or credit cards with a secure 3D Secure procedure. Also check the online shop&#8217;s reviews and privacy policy before making your purchases to minimise the risk of fraud.<\/p>\n<p>In the midst of the love of Valentine&#8217;s Day, digital security is just as important. From protecting yourself from phishing emails to choosing online gifts safely, small steps can ensure a secure online experience. Enjoy Valentine&#8217;s Day worry-free by protecting your digital world with love!<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?gguid=PER-FSX9U9J&amp;allou=1\">Malak Mostafa<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":5003,"featured_media":18519,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[308,311,314,315],"tags":[621,184,81,866,1087],"class_list":["post-18513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-jubilaen-erfolge","category-fun-facts","category-it-sicherheit","category-services-support","tag-cybersicherheit","tag-datensicherung","tag-it-security","tag-sicherheit","tag-valentinstag"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/18513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/5003"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=18513"}],"version-history":[{"count":12,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/18513\/revisions"}],"predecessor-version":[{"id":18583,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/18513\/revisions\/18583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/18519"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=18513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=18513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=18513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}