MSU-Northern  
 
 Related Links (external) 
MSU Security Web Site 
 Help Desk
MSU-Northern students, faculty and staff - Use the ITS Help Desk as the first point of contact for your technology problems, questions & services!

Information Technology Services Help Desk
Walk-in Support:
   Cowan Hall 117B Telephone Support:
    265-3765
E-Mail Support:
    itstech

Last Updated: 29-Oct-2013
Information Technology Services
Information Technology Services: Malware Protection

Protecting Your Computer from Malware

Keep your operating system updated.

Use the automatic update feature. Even if you don’t want it to automatically update your system, have it download & notify you the updates are available, then install the updates at your earliest convenience. Don’t wait too long, when malware writers find out about a flaw they can be very quick to exploit it.

Keep your browser(s) updated

If you use Internet Explorer, this is done when the rest of the Windows operating system is updated.

If you use Firefox, it will tell you when an update is available and prompt you to download it. You can also check for updates anytime you want to by clicking Help and then Check for updates...

Adjust your Web browser's security settings or use a more secure Web browser. Adjust your browser preferences to limit pop-up windows and cookies. Certain types of cookies are sometimes considered spyware because they reveal what web pages you have visited. You can adjust your privacy setting to only allow cookies for the web site you are visiting.

Install and keep updated: a firewall, anti-virus, anti-malware

And when it’s time, RENEW your subscriptions. They can't keep you protected if they aren't up-to-date.

Consider a "suite" of software – a suite is individual application programs that are sold together as a group often sharing a more-or-less common user interface. They also often have features that stand alone programs and some can be used on up to 3 computers. But you should have at least 1Gb of memory otherwise you’ll get slow performance.

Windows XP & Vista have a built in firewall – use it!

Generally, free software doesn’t perform as well as pay-for programs but they are worth considering as supplementary protection. Use pay-for programs for realtime protection (majority of free software only do scans of your computer, not realtime protection), and then use the freeware periodically to check for malware the other may have missed. Use caution downloading freeware: for instance some so-called anti-spyware is actually spyware. Do some research with you favorite search engine.

Get a spam filter only if you’re using your ISP filter and you are still getting too much spam.

Keep ALL your applications updated

This includes all the add on programs you’ve downloaded like iTunes, Quicktime, Acrobat Reader, Java… these have all at one point or another been found to have vulnerabilities.

Turn off your computer.

If you have a “always on” connection like a cable modem or DSL, this will reduce the chance a malicious remote computer will access it. And it’ll save energy.

Watch what you download

Only use well-known manufacturers or trusted sites (download.com, snapfiles.com, tucows.com)

Use caution when clicking on agreements while you are using a Web-based service. Read the agreements before clicking them. Most people do not take the time to read these agreements: you may be agreeing to let spyware be loaded on your PC. If you're not sure whether to trust a program you are considering downloading, enter the name of the program in your favorite search engine to see if anyone else has reported that it contains spyware. Definitely avoid some of the known spyware carriers, such as: CoolWebSearch, Kazaa, Grokster, Snood, Weatherbug

Beware of peer-to-peer file-sharing services. Many of the most popular services include spyware in their installation procedures. Never download an executable file from a P2P. In general, you should only download executable files from known vendors or trusted sites.

Don’t click on hyperlinks or download files in emails, IM, chat rooms.

Most users infect themselves by clicking unexpected or suspicious links in e-mail, IM messages or on questionable Web sites. Links can also show one address but take you to another.

Don't follow e-mail links claiming to offer anti-spyware or anti-virus software: Like e-mail viruses, the links may serve the opposite purpose and will actually install the software it claims to be eliminating.

Use disposable email addresses to thwart spammers

Use different addresses for different purposes. Guard your primary address and use it only for trusted personal communications, use disposable ones for things like shopping – when they attract too much spam, dump it and create a new one.

Type carefully.

Sometime look-alike sites are created that use common mistypings of popular web addresses.

Backup your data

Use external hardrives, flash drives, DVDs to backup your data regularly.

... and Protecting Yourself Online

Passwords

Yes, it’s a pain to change and keep track of passwords but they are a very important part of keeping your computer and your accounts safe. If your password is compromised, an intruder may obtain access to your email, your data files, your bank accounts, your personal information or your identity.

Don’t have any accounts without passwords.

Make sure the password on your administrator account and all accounts that have administrator privileges have very strong passwords.

At Northern, the person to whom an account is issued is ultimately responsible for all activity in the account.

Read more about Passwords

Use credit cards when shopping one line.

The safest way to shop on the Internet is with a credit card. In the event something goes wrong, you are protected under the federal Fair Credit Billing Act. You have the right to dispute charges on your credit card, and you can withhold payments during a creditor investigation. When it has been determined that your credit was used without authorization, you are only responsible for the first $50 in charges. You are rarely asked to pay this charge.

It is recommended that you obtain one credit card that you use only for online payments to make it easier to detect wrongful credit charges. For more information on credit card consumer protections, see http://www.privacyrights.org/fs/fs32-paperplastic.htm#3

E-commerce shopping by check leaves you vulnerable to bank fraud. And sending a cashier's check or money order doesn't give you any protection if you have problems with the purchase.

Make sure your credit card is a true credit card and not a debit card, a check card, or an ATM card. As with checks, a debit card exposes your bank account to thieves. Your checking account could be wiped out in minutes. Further, debit and ATM cards are not protected by federal law to the extent that credit cards are. For more information on debit cards, a checks card, and ATM cards, see http://www.privacyrights.org/fs/fs32-paperplastic.htm#4

Guard your personal information.

Never respond to emails or popups requesting passwords, user names, SSNs or other personal information, no matter how official it looks. If you’re asked to call a telephone number, verify that phone number independently.
Read more about Identity Theft

Review your credit reports regularly.

Read about Protecting Yourself from Identity Theft

Don’t use public access computers for accessing personal information.

Public access computers are those in internet cafes, public wireless networks, and lab computer. You have no idea what malware may be installed. When you do use public computers, don’t forget to log out.

 

More Suggestions for Safer Web Surfing

 

Top of page

Return to Malware

 
It's up to you.
Take these steps to help ensure the security of your identity and your computer.

Security Updates
Antivirus Software
Firewalls
Secure Passwords
Malware Protection
Phishing Tips
Social Networking
Pop-up Blockers
Most browsers come with built-in pop-up blockers. If you are getting pop-ups, make sure your browser is up-to-date and check to see that pop-up blocking is enabled:

In Internet Explorer: Click Tools then Pop-up Blocker

In Firefox: Click Tools then Options, and look on the Content screen

If you need to allow pop-ups from a particular site, you can add it to the browsers exception list:

In Internet Explorer: Click Tools. Pop-up Blocker and Pop-up Blocker Settings. You can then enter the name of the site you want to allow pop-ups from.

In Firefox: Click Tools then Options, and on the Content screen click the Exceptions button and add the site you want to allow.
Tools
Malware Scanners
Some useful free programs to scan your computer for malware:
 • MalwareBytes
 • Spybot Search & Destroy
 • Trend Micro House Call
 • Spy Sweeper
For Mac Users:
 • MacScan

Malware Prevention

 • SpywareBlaster

Antivirus

 • AVG Antivirus

Rootkit Scanners

 • GMER
 • Rootkit Buster

Find exactly which patches you need to secure your PC

 • Secunia Personal Software Inspector

Before you download...
Rogue security software claims to scan and detect malware or other problems on your computer, but really try to get you to purchase their software by using misleading or false scan results. Not sure if a program is legit? One thing you can do is check to see if it is listed on Sunbelt's Rogue Security Program list
Report Security Incidents
Report stolen devices (laptops, PDAs, etc) and suspected computer break-ins to ITS immediately. The sooner we know about an incident, the sooner we can respond, potentially limiting any damage.
Montana State University-Northern · P.O. Box 7751 · Havre, MT 59501 · 800.662.6132
Copyright © · Disclaimer · AA/EEO Statement · Online Privacy Statement
Since 1929