We are in an extraordinary situation, and this requires unusual measures: Cancel events, expand of teleworking, set up communication infrastructure, but at the same time, many people are insecure and wait for instructions on how they should behave. This makes many people vulnerable to false reports and misleading or harmful recommendations. This is the ideal… Continue Reading COVID-19: the perfect opportunity for copycats.
From tomorrow (Thursday, March 5) morning on, you will be able to modify/create/delete all files and folders in H:\OLD_H_Drive. You can safely use the current H:\ drive and there are no additional changes planned/needed. If you do not have a H:\ Home drive, or your current H:\ does not contain a folder OLD_H_Drive, please contact… Continue Reading What happened with my H:\ drive?
We get a lot E-Mails every day, but when receiving a message from the boss (or another company leader) we are on alert. This is how criminals try to get our attention, and just lately we (i.e. recipients at IST Austria) received a couple of emails impersonating managers/heads of IST Austria. These – so called… Continue Reading Spear phishing – CEO fraud
The service uses OCR – optical character recognition – to convert images of text to regular computer text. You can upload a scanned PDF and OCRmyPDF will return a PDF with text that can be searched and copy-pasted. It is available on this link (only available inside IST or via VPN).https://ocr.docker.ist.ac.at/ Easy to use: Click… Continue Reading OCRmyPDF service converts scanned PDF images to text
We are currently in the process to update our mail-server infrastructure from Exchange 2010 to Exchange 2016. The first non-IT users will be changed to the new system with middle to end of November. From a user point-of-view, the change will be mainly the new web-mail. Other, more technical changes, include a better search and… Continue Reading New mail servers coming soon!
Well, at least parts of it – currently the ISTWlan and some admin-networks as well as Windows clients in all networks are using this service. One of the major security issues when dealing with phishing/SPAM Emails, is the risk, that people visit links to enter data, or even worse visit links which trigger local vulnerabilities… Continue Reading Pi-hole is protecting our network.
Dear all, Yesterday we had to change the behavior of our network printer due to some security issues. In the past, it was possible to print directly to the printer instead of using our central print-server. Printing directly needs access to the printer, which can allow Viruses/Torjans to infect such printers. This we had to… Continue Reading Change of printing to our network printer from Wifi
Sharing data (documents, images, databases,…) to internal and external users/collaborators is a very common task we do every day. Safely sharing is not always necessary, but usually suggested. When is it necessary to share safely? The following data needs to be shared safely: Documents/data containing personal data (e.g. CVs, passports, addresses, grades, …) Financial data… Continue Reading How to safely share data
Just recently the number of various attacks against computer systems of companies has increased a lot. Still, most attacks targeting IT systems actually target the users of such systems. Read More … Continue Reading 5 Awareness tips – social engineering