BEWARE OF CYBERATTACKS
DO YOU KNOW, WHAT TO DO?


🎣  ​REPORTING

No description

What are the odds you'll get phished?

 

You bet it's hight. Learn more HERE.

LONG STORY
SHORT


1. Phishing comes in many forms, and it really works 🎯

Sophisticated phishing can manipulate even experts. It forces them to click on a link, confirm a payment, or enter their login details. The result? A stolen account, lost data, or money.

2. If you receive a sus e-mail → report it 📣

Forward the suspicious email to csirt@muni.cz. You can find out what and how to report at it.muni.cz

3. The role of the MU Cybersecurity Team 👨‍💻

We take care of the university's secure IT environment (everything on the MU network or the *.muni.cz domain). We deal with all incidents related to IT security, including phishing. We investigate reported fraudulent emails, stop them from spreading, and alert others to them.

4. It works elsewhere too 🏦

Similar to the university, banks, institutions, and (larger) companies also deal with cybersecurity incidents. If you receive a suspicious message "from the bank" or at work, report it. Usually, it is enough to contact your nearest contact person or your IT department.

5. Do good 🍀

By reporting a fraudulent message or email, you are also doing a service to others. It's a small good deed that can prevent a lot of trouble.

The golden rule: Better to report unnecessarily than too late.

 

HOW-TO
DO IT


 

#1 Learn about phishing

Even if you think phishing can't surprise you, it's good to remind yourself of a few principles for defending against it from time to time.

  • You only have 15 minutes? → Check out the chapter on phishing in Cybercompass.
  • You have more time? → Try our PhishProof, our eCourse in IS MU.

#2 Develop the habit of critically evaluating every email

A common reason for falling victim to phishing is carelessness. You overlook a "seemingly" typo in the sender's address or in the link, and they've got you.
Turning off your "autopilot" and pausing for a moment can be the difference between falling victim and resisting.

We have prepared a simple tool—a STOP sign—to help you with this.

Download STOP Sign

#3 You know what to report

In the context of cybersecurity, this includes:

  • Stolen login credentials (e.g., after phishing) to university systems.
  • Unauthorized access to data.
  • Attempts to crack passwords to IS MU or other university IT services.
  • Malware discovered on a device.
  • Unusual activities on the MU network.

BEWARE! If you have technical problems that are not related to security (e.g., slow Wi-Fi in the dorms), it is better to contact the Helpdesk or the IT department at your faculty.

You are running an old browser version. We recommend updating your browser to its latest version.

More info