Kategorie: IT-SEC

Categorisation to protect: Tiered data protection

With malicious cyber attacks on the rise, every organisation needs to act and protect its data. To optimise resources, only critical and vital data must be protected with the highest levels of security and redundancy, while less important data can just be given standard protection. The key is to understand which data is vital and which is merely important. ETH has developed a protection strategy based on four data tiers, with Tier 1 at the top and Tier 4 at the bottom of the «importance pyramid».

Weiterlesen

erstellt am ,

Time-of-click protection for URLs

Microsoft now provides «time-of-click» checking of the URLs found in email messages and documents such as MS Word files and spread-sheets.

Weiterlesen

erstellt am ,

ISO recertification successfully completed

ETH Zurich’s IT Services are certified according to ISO/IEC 20000-1 and ISO/IEC 27001. This year (2024), ITS passed the recertification process again, and the validity of the two certificates was extended until 2027.

Weiterlesen

erstellt am ,

Migration of email filter to Exchange Online Protection

As part of the migration of personal mailboxes to the cloud, the email filter (spam filter) has been switched from MailCleaner to Exchange Online Protection (EOP).

Weiterlesen

erstellt am ,

New Onboarding IT Brochures

New students, new academic staff or new administrative and technical staff: it is worth consulting the new IT brochures when starting at ETH.

Three new onboarding IT brochures
Weiterlesen

erstellt am ,

Guest WLAN (Wi-Fi)

You are visiting ETH Zurich and need WLAN access. For example, to download the ETH Tours app. What can you do if you do not have an ETH login for Internet access?

Weiterlesen

erstellt am ,

What is going on in the IT Services department?

Three times a year we publish the external newsletter inside|out in German and English. Find out what’s going on in IT at ETH Zurich. Subscribe to the newsletter to stay up to date.

Newsletter inside|out No 34
Weiterlesen

erstellt am ,

Target systems: Active Directory, LDAPS, Radius

Good to know: Active Directory, LDAPS and Radius are authentication infrastructures that are used for the utilisation of identities (persons) and for the assignment of access rights in a network. They ensure that only authenticated users (persons) can access information and systems.

Weiterlesen

erstellt am ,

Wi-Fi goes Wi-Fi 7

The release of the 6 GHz frequency band for Wi-Fi represents the largest and most important expansion of the available frequency spectrum since the introduction of the 5 GHz band around 20 years ago. This expansion is implemented from the Wi-Fi 6E standard onwards.

Weiterlesen

erstellt am ,

Important notes on OneDrive access when colleagues leaving ETH

If a colleague leaves the ETH, their account and the associated OneDrive will be deleted. This has a direct impact on all data shared by this person.

Weiterlesen

erstellt am ,