Skip to main content

Protecting Your Devices

It is crucial to have up-to-date antivirus software to protect BYU-Hawaii and maintain the security of your data.
How to protect my devices
What are the potential dangers

BYU-Hawaii Owned or Managed Computers

Office of Information Technology provides antivirus software for all university-owned and/or managed devices. If you have a University-owned Mac or Windows computer, you should have Crowdstrike’s antivirus and antimalware software installed on your computer automatically. For a university-owned device, this is required to help protect and ensure its security. If you have any questions, please call IT Helpdesk at (808) 675-3921.

Personally-Owned Computer

Office of Information Technology does not provide antivirus software for personally-owned computer devices. University employees and students with a personally-owned computer, OIT recommends:

  • Enable Windows Security (formerly Windows Defender) which is an application built-in to your Windows computer operating system. It provides real-time protection against various forms of malware, including viruses, spyware, ransomware, and other malicious software.
  • Mac OS has a built-in antivirus software to block and remove malware. Read here for more information.

Choosing an Antivirus Software

Given the numerous choices of antivirus products available, selecting the right one can be overwhelming, especially considering varying levels of effectiveness. When evaluating antivirus options, consider your operating system, budget, additional features, and user-friendliness. Alongside vendor websites, explore these additional resources for valuable information. For personally-owned computer devices, a full real-time protection and paid subscription-based solution is best.

Below, you'll find vendors providing free and paid versions of their antivirus software. We recommend obtaining these directly from the vendor's site or reputable stores like Amazon or Best Buy. Ensure that when downloading software, you use trusted sites such as download.cnet.com, support.apple.com, or the vendor's official site.

Important Notice: Avoid buying or installing antivirus software through pop-ups or email links, unless you've recently ordered it and received an installation message. If you're interested in a vendor's product, always visit the official vendor site or a trusted distribution platform. Why? Criminals frequently employ pop-ups or email links to deceive users into downloading software containing malware or attempting to steal credit card information through fake purchasing procedures.

What is a Malware and what can it do?

Malware, a shortened term for malicious software, programs designed to harm or perform undesirable actions on a computer system. This includes spyware, trojan horses, worms, viruses, and ransomware.

Spyware:
Spyware can download and install itself on your device without consent, often when visiting unsafe websites or through attachments. It can manipulate your computer to execute unwanted tasks, such as opening advertisements, and may track your online activities to steal passwords and compromise accounts.

Trojan Horses:
Trojan horses hide themselves as legitimate software and deceive users through social engineering tactics to execute them on their systems. They typically aim to steal personal information, create backdoors for hackers, or extort money by holding computer systems for ransom.

Worms:
Worms can spread through vulnerabilities or attachments in emails and messages. Once installed, they silently spread within the computer system, consuming resources by making copies of themselves. They may steal data or grant attackers access to the system.

Viruses:
Viruses are programs or malicious code designed to alter the functions of a computer by integrating themselves into legitimate programs or documents. They can corrupt or destroy data and remain dormant until activated. Viruses can steal data, log keystrokes, spam email contacts, or take control of the computer, spreading to other systems via attachments, links, or internet downloads.

Ransomware: Ransomware encrypts a victim's computer data, demanding payment to restore access. It locks files, preventing access to photos, documents, and other information until the ransom is paid. Payment does not guarantee restoration of access.

How can I prevent it?

  • Utilize a reputable security suite that provides comprehensive security features beyond basic antivirus protection.
  • Ensure that your security software is regularly updated.
  • Keep your operating system up-to-date with the latest patches and updates.
  • Refrain from opening suspicious email attachments.
  • Scan email attachments for potential threats before opening them.
  • Avoid clicking on suspicious links found in emails, messages, or websites.
  • Steer clear of visiting unsafe or potentially malicious websites.
  • Scan any files downloaded from the internet for viruses or malware.
  • Resist clicking on pop-up advertisements, especially those from untrusted sources.
  • Avoid connecting suspicious external devices, such as USB drives, to your computer.

Signs of potential infection include:

  • Sluggish computer performance beyond the usual.
  • Regular system crashes or freezes.|Persistent appearance of pop-up windows.
  • Unexpected alterations to your homepage.
  • Unfamiliar programs launching during startup.
  • Abnormal activities like unexplained password changes.
  • Sudden depletion of free space on your hard drive.
  • Presence of new or missing files.
  • Mass emails originating from your account without your knowledge.
  • Files or computer systems being inexplicably locked.
  • Alerts prompting payment to resolve purported issues.

What actions should you take?

  • Conduct a scan on your computer system if you haven't performed one recently.
  • Install your organization's approved antivirus software if it hasn't been installed already.
  • Monitor your hard drive for any suspicious alterations.
  • Backup critical work, photos, and other data to ensure their safety.