Reporting a Cybersecurity Incident
In non-urgent cases, send an email to helpdesk@amu.cz or submit a request to the Helpdesk.
To report an urgent cybersecurity incident, use the numbers listed below.
Operating Hours | Line Description | Line Number |
---|---|---|
from 08:00 to 16:00 | Computer Centre | +420 234 244 508 |
from 16:00 to 23:00 | Jiří Krčmář | +420 234 244 548 (redirected) |
from 23:00 to 08:00 | IT Emergency Number | +420 778 773 559 |
Saturday, Sunday | IT Emergency Number | +420 778 773 559 |
The IT Emergency Number is not for handling regular IT requests.
What is a Cybersecurity Incident
A cybersecurity incident is an event that threatens the security of information systems, services, or electronic communication networks. It may involve breaches of confidentiality, integrity, or availability of data.
Cybersecurity incidents can be categorized into several types:
- Malware: Malicious software, such as viruses, trojans, or ransomware, that can damage or exploit a system.
- Phishing: Attempts to obtain sensitive information, such as passwords or financial data, through fraudulent emails or websites.
- Data Breach: Unauthorized acquisition or disclosure of sensitive information.
- Social Engineering: Manipulating people into performing actions or divulging information that can be exploited.
- DDoS Attacks: Distributed Denial of Service attacks that overwhelm a system, making it unable to function normally.
How to Report a Cybersecurity Incident
If you believe you have been a victim of a cybersecurity incident, it is important to inform us as soon as possible. To effectively respond to your incident, please provide the following information:
- Your Contact Information:
- Name
- Email Address
- Phone Number
- Incident Description:
- Date and time when you noticed the incident
- Which systems or data were affected
- What steps you have already taken (e.g., disconnecting the device from the network)
- Technical Details:
- Type of device (e.g., computer, laptop, mobile phone)
- Operating system and version
- Any other relevant software or applications
- Attachments:
- Screenshots
- Logs or other evidence that may help in analyzing the incident
Author: Jiří Krčmář | Date: 26.09.2024