Secure Computing at King's
Recommended AntiVirus Software
Microsoft Defender Antivirus
Microsoft Defender Antivirus is a key component of Microsoft's security suite, providing robust protection against various cyber threats. Here are its main features:
- Real-Time Protection: Continuously monitors your system for malware, viruses, and other threats, offering immediate detection and response.
- Cloud-Delivered Protection: Utilizes Microsoft's cloud infrastructure to quickly identify and block new and emerging threats.
- Automatic Updates: Regularly updates its virus definitions to ensure your system is protected against the latest threats.
- Behavioral Analysis: Uses machine learning and behavioral analysis to detect suspicious activities and potential threats.
- Ransomware Protection: Includes controlled folder access to protect your files from ransomware attacks.
- Performance Optimization: Designed to run efficiently in the background without significantly impacting system performance.
Microsoft Defender Antivirus is integrated into Windows 10 and later versions, providing a seamless and user-friendly security solution.
Other Anti-Virus Software
You may also choose from one of the following free anti-virus solutions:
Network Password
Your network password provides access to a variety of services: email, office 365 downloads, lab computer use, Moodle and the wireless network.
The first line of being secure is a password. Having a secure password is critical in today's world. You should never give your password to anyone or even share it with a friend. Here are our recommendations for a secure network password:
- Make it at least eight characters long
- Upper and lower case letters, numbers and punctuation
- Do not use the same password on different sites.
- Consider using a pass phrase:
- Myd0gHasFl3@s!
- @another1bytestheDust
- C@llurMoth3r
To change your network password please use this link.
Phishing
Phishing email messages, websites, and phone calls are designed to steal access. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off your computer. They also can become you on the internet and send messages that appear to come from you.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off a website.
King's IITS uses a variety of techniques to prevent phishing messages, however some phishing messages do come through.
What does a phish message look like? There are a few things to tip you off that the message is a phishing message, See the example below:
- The sender may not have a King's email address.
- There may be misspellings or poor grammar in the message.
- You will be asked to visit a website or email your info to a non-King's address.
- The sender will have a different name than the person whose name appears in the signature.
- King's College IITS will never ask for your username, password or personal information. You will never be asked to update or upgrade your email.
This is an actual phishing message King's received. The link and the address have been changed:
|