Information Security
Page tree

The Trinity of Antivirus Protection

  1. Use Antivirus Software Properly

    Syracuse University requires that antivirus software be installed and running on all computers connected to the University's networks.

    Once installed, antivirus software must be regularly updated so that it can detect and eliminate the latest viruses that attack your computer. ITS recommends that you either manually check for updates for your antivirus software weekly, or configure your computer to automatically check for updates on a daily basis. In addition, you should completely scan your system for viruses at least once a week.

    IMPORTANT NOTES: Many new computers come with trial or demonstration versions of antivirus software. These trial versions do not meet SU requirements. Students need to verify that the antivirus software installed on their computer is a fully licensed version.

  2. Update Your Machine's Operating System

    Computer software often has security holes that can be found and exploited by malicious software such as viruses, worms, and Trojans. When security holes are discovered, companies patch their software with updates; however, it is up to computer owners to apply the patches to their machines.

    To ensure that your computer is updated with the latest security patches and fixes, check your operating system updates on a regular basis. If you are running a Microsoft Windows operating system you can configure your computer to automatically check for updates to the software.

  3. Avoid Strange Email Attachments

    Never open e-mail attachments unless you confirm the source and are expecting the attachment. Do not open attachments with file extensions such as ".VBS", ".EXE", or any extension with which you are not familiar.

    Beware of "spoofed" e-mail addresses in the "from" message box. The address may contain a name you recognize, but the person may not have sent the message. Hijacking e-mail addresses is a technique used by spammers and virus programs.

    When in doubt, delete all suspicious e-mail messages. Do not reply to the sender. The act of responding to suspicious e-mail will validate your e-mail address and may result in future e-mail harassment. Bottom line: If something looks unusual in an e-mail, DELETE IT!

Questions? Users with questions regarding antivirus software can contact ITS at help@syr.edu or 315-443-2677.

  • No labels