Blog Archives

Introduction of multi-factor authentication at the Chemnitz University of Technology

Multi-factor authentication is a procedure that asks for an additional factor in addition to the user name and password when logging in in order to better protect IT services and data from unauthorised access of third parties. The procedure has been available as an option at Chemnitz University of Technology for some time now. From 3 June 2024, the use of MFA will be mandatory. On 15 May 2024, we cordially invite you to a user forum in which the procedure will be presented once again and questions can be asked.

Tagged with: ,
Posted in Campus Network, IT-Security

Security initiative: Kerberos authentication in the campus network

Schloss mit Schlüssel

As part of the increase in IT security, authentication using Kerberos will only be supported within the campus network from April 4, 2023.

Tagged with: ,
Posted in IT-Security, System

End of support for MS Office 2013

The manufacturer support (supply with security updates) for MS Office 2013 ends on 11 April 2023. This requires an update of corresponding installations.

Tagged with: ,
Posted in IT-Security, Software, Uncategorized

An (Almost) Perfect E-Mail Deception – or: You can Never be too Careful!

Beware, we keep observing emails that are intended to encourage recipients to download files with malware!

Tagged with: ,
Posted in IT-Security

“Check your e-mail account …”

Attention: Phishing emails ask for access data on fake pages.

Tagged with: ,
Posted in IT-Security, Uncategorized

Protective measures against ransomware

The Bavarian State Office for Data Protection Supervision and the IT Law Department of the Bavarian state universities and colleges provide material to assist in prevention.

Tagged with: , , ,
Posted in IT-Security, System

New year, new tricks – Beware of e-mail fraudsters

Unfortunately, scams via e-mail are not uncommon. We show a new scam and look into the question why this kind of trickery seems to be promising.

Tagged with: , ,
Posted in IT-Security, Uncategorized