Cybersecurity Minimum for University Employees
A basic set of recommendations for campus safety.
Training provides a summary of fundamental security recommendations and measures. It is primarily intended for employees of Masaryk University and is currently available on a voluntary basis at selected MU workplaces (e.g., FI, FF, ESF) within the training agenda in the školení v IS MU. If you do not see the training in IS MU, please contact us at vzdelavani@csirt.muni.cz, and we will assist you. The content is divided into seven thematic blocks, covering key principles of cybersecurity. In addition to theoretical foundations, it includes practical recommendations and links to guidelines, allowing participants to significantly enhance their digital security in practice. The training was developed in accordance with the requirements of Act No. 181/2014 Coll., on Cybersecurity, and Directive No. 10/2017 on the Use of Information Technologies at MU.
For whom: employees
Format: self-study
Language: CZ / EN
Duration: ~60 minutes
Course content
-
Secure passwords
How to manage passwords correctly, why it's important to use different passwords for services, and how a password manager can help you.
-
Multi-factor authentication
An introduction to MFA methods, their importance to account security, and recommendations on how to effectively protect access to critical services.
-
Device security
Precautions to protect personal and work devices, including proper screen lock settings, software updates and tool usage.
-
Working with data
Secure data storage and sharing rules, backup policies and encryption options to help protect sensitive information.
-
Safe communication
Recommended methods of electronic communication, highlights the security of work emails and the risks associated with using unofficial channels.
-
Phishing
Recognising fraudulent messages, the risks associated with clicking on unknown links and procedures for verifying the trustworthiness of emails.
-
Incident reporting
Why it is important to proactively respond to suspicious activity, how to report a incident and where to seek help in the event of a cyber attack.