Salesforce

Antivirus Recommendation

« Go Back

Information

 
TitleAntivirus Recommendation
Resolution Description

 

To protect your personal computer from viruses, Butler Information Technology recommends using the built-in security software provided with the operating system. Both Windows and macOS computers come with built-in security software. Windows 10 and 11 include Windows Security.

 

Computers found to be infected with a virus will be removed from the Butler network due to the security risk they pose, and a password change for the Butler account will be enforced.

 

Microsoft Windows Security Resources

Stay Protected With the Windows Security App

Schedule Regular Scans in Microsoft Defender Antivirus

Microsoft Defender Antivirus in the Windows Security App

Firewall and Network Protection in the Windows Security App

 

macOS Security Resources

macOS - Security - Apple

Set up your Mac to be secure

Protecting Against Malware in macOS

Gatekeeper and Runtime Protection in macOS

 


Recommendations to Follow Along-side Built-in Security Software

It is not enough to solely rely on the built-in security software provided by either Windows or macOS. The following security best practices should be implemented regularly to keep your device and information secure and safe from malware, viruses, or malicious corruption.

 

  1. Keep Software & OS Updated

    • Regularly install security updates for the operating system, applications, and web browsers.

    • Enable automatic updates whenever possible. 

  2. Use Strong & Unique Passwords

    • Create complex passwords (at least 12-16 characters with a mix of letters, numbers, and symbols) - passphrases can make them easier to remember.

  3. Enable Two-Factor Authentication (2FA)

    • Use 2FA for all accounts where it is available, but especially for emails, banking, and social media.

    • Prefer authentication apps (i.e., Google Authenticator, Authy, Microsoft Authenticator) over SMS-based 2FA.

  4. Be Cautious with Email & Links

    • Avoid clicking on suspicious links or downloading attachments from unknown senders.

    • Verify URLs before entering any information to prevent phishing attacks. 

    • If you receive a suspicious email, report it immediately: How to Report a Suspicious or Phishing Email

  5. Use Built-in Firewalls & Network Security

    • Keep Windows Defender Firewall or macOS Firewall enabled.

    • Use secure Wi-Fi connections only.

      • If you must access an open/public network, do NOT access any websites or documents with sensitive information.

  6. Regularly Back Up Important Data

    • Use external drives or cloud services (i.e., OneDrive, Google Drive, iCloud) for automated backups.

    • Ensure backups are encrypted and stored in a secure location.

  7. Be Mindful of App Permissions & Downloads

    • Only install software from trusted sources (Microsoft store, App Store, or verified developers).

    • Regularly review and limit permissions granted to apps and services.

  8. Enable Device Encryption

    • Use BitLocker (Windows) or FileVault (macOS) to encrypt sensitive files and protect against unauthorized access.

  9. Use a Reliable Ad-Blocker & Web Protection

    • Install browser extensions to block malicious ads.

    • Enable "safe browsing" in Chrome or "smartscreen" in Edge to detect harmful websites. 

  10. Monitor for Suspicious Activity

    • Check for unusual system behavior, unknown software installations, or unauthorized access attempts.

      • Microsoft will NOT send you a pop up message when you are in a browser to tell you your computer is infected - this is a scam. If you receive this, quit your browser immediately and do not navigate back to the compromised site you were previously on.

    • Regularly review security settings and activity logs on important accounts.

 

 

URL NameAntivirus-Recommendation

Powered by