15 Jun Warning: Vulnerability in the MS Office Cybersecurity Team of Masaryk University warns of the vulnerability in O365 applications that allows malicious code to run on your device. How does this threat work precisely, and what can you do to avoid it?
I See the Transition from Commercial to Academic as a Challenge, Says New HR Specialist Monika Oswaldová A new reinforcement HR specialist Monika Oswaldová, who has taken over the management of the HR team as a backup for maternity leave, has been working for us for the last two months. With what experience and visions did she come to the institute? And why does she see the transition from commercial to academic as a challenge? You will find out in a short interview.
Plans for 2022 Were Presented at a Meeting of the IT Community At the end of April, we organized the first meeting of the IT community this year, where representatives of local IT departments of faculties and other university centers presented plans for 2022 and looked back on the past year. It also included a visit to the recently opened monitoring center at the University Computer Centre.
31 Mar Fraudulent phone calls from fake Microsoft technical support Cybersecurity Team of Masaryk University has recently received several reports from users about fraudulent calls to Masaryk University's specialist workplaces.
By Images: Newly Equipped Monitoring Center Our ServiceDesk, which is located in the University Computer Centre right in the center of Brno on Komenského náměstí, ceremoniously opened the newly equipped monitoring center on Friday afternoon, March 25. How did it look like?
2 Mar War and chaos in cyberspace: CSIRT-MU advises what to be careful about The current armed conflict has not only affected its direct participants - you may have noticed that part of its events is also taking place in cyberspace, which is causing an increase in various threats. In response to these threats, our team has prepared some tips and tricks that can help you avoid potentially unpleasant situations.
23 Feb Semester security guide Returning to study mode and semester-related responsibilities can sometimes be challenging. But the attackers from cyberspace never sleep. They don’t wait for us to settle in semester again. That’s why we shouldn’t hesitate and make sure, that we know, how to face traps we may encounter during the semester.
Need a Help With Research Data? Try Our Course Scientific data management is a common and necessary component of everyday scientific practice. However, sometimes researchers do not know how to approach the topic. That is why we have prepared a course - 12 online lessons loaded with information from experts on the topic of secure management of research data. We start on Tuesday, February 22, 2022!