IT-Sicherheitsvorfall/IT-Notfall | A-Z | Kontakt/Beratung
Are you concerned about a security incident, have you observed unusual behaviour in an IT system, or would you like to report a security-related incident? This page provides guidance on the initial measures you should take in the event of security-related incidents.
Security incidents require swift action to prevent further damage. As a rule, security incidents must also be reported and documented..
Employees without professional IT support and students must take care of relevant support tasks themselves.
Security-related incidents primarily include the incidents and suspected cases listed below. In addition, we kindly ask you to report any other circumstances and incidents not listed here that relate to IT and information security to the following departments:
Phishing emails aim to lure you to malicious websites in order to steal your data, especially access data such as your RUB password.
If you have followed such a fraudulent request to a non-RUB website, please note the following two points:
Please always remember to inform your IT support and the ISB/RUB Cert team (email contact) so that they can take the necessary further measures.
If your login details have fallen into the hands of third parties, e.g. because you entered your RUB password on a phishing site, your password is now compromised.
Change your RUB password immediately:
Caution: Even visiting a malicious website can lead to your computer being infected with malware. The device used must be checked. It is therefore advisable to shut down affected devices. You can find information on this in the section Suspected malicious code.
If at all possible, use a different, secure device temporarily to change your password.
Please always remember to inform your IT support and the ISB/RUB Cert team (email contact) so that they can take the necessary further measures.
Accounts that appear to have been compromised are temporarily locked to protect against identity theft or further misuse. This typically happens when a fraudster has stolen your password and is using it to send spam/phishing emails via your account.
Contact your IT support:
Caution: Even visiting a malicious website can lead to your computer being infected with malware. Devices used for this purpose must be checked. It is therefore advisable to shut down affected devices. You can find information on this in the section Suspected malicious code.
Contact the ISB team: With the compromise of your password, unauthorised persons have gained access to your mailbox and RUB systems. This makes it possible for unauthorised persons to disclose personal data. The RUB is obliged to examine the matter from a data protection perspective, document it internally and, if necessary, initiate the required notifications (email contact).
Activating your account: Once your computer has been checked and data protection issues have been clarified, you can activate your account in the IT.SERVICES service centre. To do this, you must also set a new password:
The term malware refers to a wide variety of software/programs that perform unwanted or harmful functions on a computer.
If you notice any unusual system behaviour, such as...
an analysis of your system is necessary.
This is particularly important if you have followed a link that was sent to you directly by email or indirectly via a document from an unknown person (via phishing/spam email).
In such cases, it is advisable to shut down the device you are using and have it checked. Use another, secure device temporarily.
Contact your IT support: