Make sure your devices are really currently protected against viruses and other Internet threats. Please pay close attention, especially when travelling with your device and using it in different networks and locations. Use best practices for the safe use of computer technology. Think not only of your computers and laptops, but be equally attentive to your mobile phones, tablets and other devices.

Computer viruses, spyware and malware

Free and recommended solutions are usually available at CTU and at faculties. If you are unsure whether they are activated and properly set up and updated on your workstation, contact your administrator. For example, with common antivirus solutions, it is common for virus signatures to be updated several times a day. Usually there is already a problem if they are older than one day.

Principles of antivirus protection on computers

Use your antivirus software from the very first moment. If your new or reinstalled computer does not have an antivirus program, install it as a first step. You can then start downloading and installing other programs. If your computer includes an anti-virus program, download the latest updates immediately to protect yourself against the latest threats. Update your antivirus program regularly and, if possible, turn on its automatic updates.

Software fixes and patches

Operating systems and user programs are still evolving, much like computer threats to which they must respond. Therefore, good operating system and program manufacturers usually release free fixes to newly discovered security issues. If such actions are not provided directly by your administrator, do not hesitate to install these software fixes and patches. Their early installation reduces the risk of attacking your device.

Back up

All end devices are only technical products with limited lifetime and their failures are not excluded. So back up your important information and settings. Only efficient backups will reduce the risk of lost data and time in case your device failures.

In case of attack

If you suspect that your device has been attacked, do not use it and work with your administrator to verify and correct the status. Particularly, try to reduce the risk of attacking other systems and devices.

Loss or theft

If your device has been lost or stolen, administrators can often have the option to remotely delete it or search for it. If you administrate your devices yourself, you can often set up such an option for your devices within your operating system or third-party solution. Keep yourself informed about such solutions. In any case, contact your administrator to take precautions to restrict the ability of your device to access university systems and services, if such access has been allowed, and to prevent the use of university-licensed SW.

Content owner: CIC - Department of Integration and Coordination I. (81370) , Last change: 30.09.2019