...
...
...
...
...
...
This article is for students, faculty, and staff, and provides step-by-step instructions and best practices for how users can protect their computers from security risks.
...
Staying Up-
...
To-
...
Date on
...
Security Patches
Patching vulnerable applications and operating systems reduces the number of exploitable entry points.
If you are running a supported operating system (Windows 10), you should review Windows Update to check the status of your updates and, if needed, download, the latest security patches. If you have not been keeping up with your Windows Updates, then you may need to run it multiple times to get your computer completely up-to-date. If you are running an unsupported operating system (i.e., Windows 7 and older), contact the Technology Support Center or your local IT support team. They will assist you in updating to a supported operating system.
If you are using Mac, view the article on checking for and installing updates on Mac OS and Mac OS X.
...
Maintaining Up-
...
To-
...
Date Anti-Virus Software
All university University systems have pre-installed protection software.
For Windows 10, Windows Defender is natively installed on your computer. To determine if Windows Defender is able to protect your computer,
Click the Start
...
button.
Select Settings.
Click on Update & Security.
Select Windows Defender.
Click on Open Windows Defender.
Select
...
the Update tab in Windows Defender.
...
Select Update Definitions.
Note |
---|
For personal devices that are not universityUniversity-owned, you can install one of the many free and paid software programs that can help protect your system when using it for university business or personal use. For ongoing protection there are several free versions of antivirus. PC Magazine has a great resource evaluating some of the top vendors (https://www.pcmag.com/picks/the-best-free-antivirus-protection). |
...
Saving your
...
Files on
...
University-
...
Supported Infrastructure
The University provides secure file storage. For students, faculty and staff, ITS recommends OneDrive, cloud-hosted storage that integrates with applications in Microsoft 365. OneDrive is also available to students. Students may also choose to use Google Drive, offered as part of G Suite.
...
Not Falling Prey to Phishing Messages
Be suspicious of unsolicited attachments, especially from untrusted or unknown sources. Do not follow unsolicited Web links in emails. For more information about phishing and how you can protect your computer from phishing attacks, review the article, Protect see Detect and Protecting Yourself from Phishing.
Related Articles
Filter by label (Content by label) | ||||||
---|---|---|---|---|---|---|
|
Page Properties | ||
---|---|---|
| ||
|