To protect your personal computer from viruses, Butler Information Technology recommends using the built-in security software provided with the operating system. Both Windows and macOS computers come with built-in security software. Windows 10 and 11 include Windows Security.
Computers found to be infected with a virus will be removed from the Butler network due to the security risk they pose, and a password change for the Butler account will be enforced.
Microsoft Windows Security Resources
Stay Protected With the Windows Security App
Schedule Regular Scans in Microsoft Defender Antivirus
Microsoft Defender Antivirus in the Windows Security App
Firewall and Network Protection in the Windows Security App
macOS Security Resources
macOS - Security - Apple
Set up your Mac to be secure
Protecting Against Malware in macOS
Gatekeeper and Runtime Protection in macOS
Recommendations to Follow Along-side Built-in Security Software
It is not enough to solely rely on the built-in security software provided by either Windows or macOS. The following security best practices should be implemented regularly to keep your device and information secure and safe from malware, viruses, or malicious corruption.
-
Keep Software & OS Updated
-
Regularly install security updates for the operating system, applications, and web browsers.
-
Enable automatic updates whenever possible.
-
Use Strong & Unique Passwords
-
Enable Two-Factor Authentication (2FA)
-
Use 2FA for all accounts where it is available, but especially for emails, banking, and social media.
-
Prefer authentication apps (i.e., Google Authenticator, Authy, Microsoft Authenticator) over SMS-based 2FA.
-
Be Cautious with Email & Links
-
Avoid clicking on suspicious links or downloading attachments from unknown senders.
-
Verify URLs before entering any information to prevent phishing attacks.
-
If you receive a suspicious email, report it immediately: How to Report a Suspicious or Phishing Email
-
Use Built-in Firewalls & Network Security
-
Regularly Back Up Important Data
-
Use external drives or cloud services (i.e., OneDrive, Google Drive, iCloud) for automated backups.
-
Ensure backups are encrypted and stored in a secure location.
-
Be Mindful of App Permissions & Downloads
-
Only install software from trusted sources (Microsoft store, App Store, or verified developers).
-
Regularly review and limit permissions granted to apps and services.
-
Enable Device Encryption
-
Use a Reliable Ad-Blocker & Web Protection
-
Monitor for Suspicious Activity
-
Check for unusual system behavior, unknown software installations, or unauthorized access attempts.
-
Regularly review security settings and activity logs on important accounts.