Kyberbezpečnostní tým Masarykovy univerzity si pro vás na toto období připravil adventní věnec, který vám každý týden osvětlí jedno téma, které se vám možná bude v předvánočním čase hodit. Podíváme se na to, jaké nástrahy mohou útočníci v kyberprostoru klást před Vánoci – tušíte správně, že nelení.
Cybersecurity at MUNI
Practical and understandable advice that is also useful outside the university
Information on cyber security topics worth knowing about, especially during Christmas.
Returning to the semester and the responsibilities that come with it can be challenging at times. However, attackers in cyberspace never sleep and do not wait for us to look around again. That is why we have prepared a few tips that can save you extra worries.
How to save yourself from extra worries (not only) during the semester, thanks to a few steps?
What are social engineering techniques, and how to defend yourself if you encounter them? You will find out in nine compelling stories from different people who have faced this type of cyber attack.
Stories of frequent social engineering techniques
We chose practical information and prepared understandable guides, thanks to which you’ll act responsibly in cyberspace. Invest in yourself and gain knowledge that the university, employers, and you will truly appreciate and use. It’s up to you from now on!
The navigator to the golden middle way in the world of cybersecurity
When and to whom
to report your suspicions?
Suspicious message? Does the computer behave strangely? Feel free to report your suspicions to the CSIRT-MU team, even if you are unsure. You will help yourself and others.
Warning
What to watch out for when surfing in the Masaryk University cyberspace?
Articles
Recommendations on how to navigate safely in the cyber world and avoid risks.

Thanks to the cooperation of CSIRT-MU and the MUNI University of the Third Age (U3V), the course “Cybersecurity while working on a PC for seniors” was created in the spring semester. How was the course, and what are the impressions of the lecturers and graduates?

Have you noticed that the sender's address sometimes looks trustworthy in similar e-mails at first glance? In the following article, you will learn how this situation is possible and how the e-mail headers are related to it.
Stay tuned!
Follow us on social networks. We create relevant and up-to-date content for you, thanks to which you will always have an overview.