Security: Protecting Yourself Against Viruses and Malware
Updated: 05 October 2017 10:23 AM
|
|
Related Articles: Security: Phishing Emails, Blocking Senders and Managing Junk EmailMalware is Malicious SoftwareThe best defence against cyber attacks starts with you – the students, staff and faculty of OCAD U. Malware is software - usually delivered in the form of an attachment like a Microsoft word file - which attempts to gather sensitive information, damage your computer or display unwanted advertisements. Recently a particular kind of malware known as ransomware has become popular. This software can lock you out from ALL of the files on your computer and demand that you pay hundreds of dollars to get them back. Malware comes in many forms, and can target Windows, macOS and mobile devices. Enable Two-Factor AuthenticationFor any service that supports it, you should enable two-factor authentication (sometimes shortened to 2FA). Two-Factor Authentication requires services to send texts or notifications to a mobile device when you sign into services with a new browser. "two-factor authentication is a simple feature that asks for more than just your password. It requires both "something you know" (like a password) and "something you have" (like your phone)." - Lifehacker Install Anti-malware SoftwareWe have frequently recommended that users run some sort of Antimalware software. One example is Malwarebytes: Install Anti-virus SoftwareOCAD U Owned Desktops & Laptops
Personal Laptops
Using Anti-virus provides an additional layer of protection your machine from getting infected if you download malware accidentally. Anti-virus software should be considered a last line of defense, and will not protect against poor computer security practices, this is because an anti-virus can only protect against known viruses, poor passwords, visiting unsecured sites and scam emails will not be detected by an Anti-virus. Mac computers should also have an Anti-virus installed, as they are vulnerable to virus infection as well. Mobile Devices
About Phishing
How to Get Help
| |
|