Skip to content Skip to menu

Cookie settings

Here you can set the use of cookies according to your preferences.

Technical cookies

are necessary for the proper functioning of the site. Technical cookies must always be active (they cannot be deactivated individually), therefore no consent is given for their use.

Analytical cookies

they allow us to understand how you use the site so that we can improve it. Analytical cookies allow us to measure website performance (number of visits and traffic sources). We process the data obtained in this way in summary, without the use of identifiers pointing to a specific user.

Personalized cookies

store information about your personal site settings. We need personalized cookies in order to adapt the website and its behavior as much as possible to your needs and interests.

Advertising cookies

set up through this site by our advertising partners. Advertising cookies allow us to display such content that will be interesting and useful just for you.

We use cookies

We use cookies to analyze traffic, remember preferences and improve the usability of the website. To give your consent, click on the "I Agree" button.

Settings I agree

You can refuse consent at any time.

Safe MENDELU

Cybersecurity practices

    Safety Ten Commandments

    1. If you don't know, ask.

    If I suspect a cyber-attack, receive a questionable email, or my computer is acting strangely, I contact the HelpDesk to discuss the next steps. I follow the instructions of the experts.

    2. You will authenticate and authorize yourself.

    The computer does not recognize me on its own, so I have to prove my identity to it, for example by knowing the password to the user account (authentication). In applications, programs and information systems, I often do not have authorization for all activities. Therefore, authentication is followed by authorization, which determines what I can and cannot do.

    3. Be careful where you enter your password.

    I only enter my login information into a web page that is encrypted, i.e., its address starts with https:// and has a lock icon at the beginning. It is important that the address of the site is accurate; even fraudulent sites can use encryption.

    4. You will be healthily suspicious of incoming mail.

    Electronic mail is often misused to send spam, hoaxes, phishing or bulk messages. Be wary of suspicious emails, especially those that contain attachments or links to sites. The attachment may contain malicious code and the linked site may be fraudulent.

    5. Thou shalt not believe everything that is written on the Internet.

    Anyone can post information on the Internet, even an author who is ignorant or deliberately manipulative. Therefore, I always check the credibility of the information I receive. In a work environment, I must handle information judiciously; not all information is for everyone.

    6. You will encrypt confidential information.

    Data encryption ensures that the information cannot be read by anyone who obtains it, but only by those who know the extra decryption key. An electronic signature confirms that the signer is the author or agrees with the content. It also confirms that the content of the electronically signed document has not changed after signing.

    7. You are not anonymous on the Internet.

    By browsing sites and using services on the Internet, I leave a lot of traces. Other traces are created by voluntarily disclosing information about myself, especially on social networks. All these activities reduce my anonymity and it is good practice to behave as if anyone can identify me.

    8. Thou shalt protect my computers and back up my data.

    No one unauthorized should use someone else's personal item such as a computer. I must protect such devices by locking my office and using a screen lock. I make sure that its software is up to date or I entrust the management of the device to professionals. I regularly back up important data.

    9. Mobile devices are also computers.

    A mobile device, nowadays most often a smart phone, is a small computer and I treat it and the data on it the same way I would a computer. In addition, I need to be aware of the risks of carrying the device or having it with me at all times.

    10. Thou shalt obey the rules and respect the law.

    The same legislation applies on the Internet as in the real world, but it is augmented by some additional specific legal standards. In addition to this state-required legislation, I also abide by the internal rules of organisations or the rules of use of specific services.