Antivirus and Malware

Malware is short for malicious software, meaning it can be used to compromise computers, steal information, bypass access controls and cause harm to your computer.

Do

  • Contact the IT Service Desk on 0117 3283612 immediately if you suspect that your UWE Bristol computer is infected with a virus. Any delay could lead to the loss of important data (see below for 'Signs your computer may be infected').
  • Ensure your personal computer is running the most up to date version of antivirus.
  • Always scan removable media (e.g. USB drives) before using it. If the USB is from an unknown source do not plug it into your device.
  • Always save email attachments and scan for viruses before reading or opening.
  • Always scan files downloaded from the Internet.

The above steps scanning for Malware and updating antivirus software happens automatically on UWE Bristol managed computers. However, if you are not sure, you can manually scan for viruses by reading the following guide. For guidance with your personal antivirus software, consult the manufacture's website. 

Don't

  • Click on links in suspicious emails or those from unknown sources.

Signs your computer may be infected:

  • Problems connecting to networks.
  • Computer freezing, suddenly slow to respond or crashing.
  • Modified or missing files.
  • Appearance of strange files, programs or desktop icons.
  • Emails or messages sent automatically.

If you suspect any of the above

Contact the IT Service Desk on 0117 32 83612 immediately if you suspect that your UWE Bristol computer is infected with a virus. Any delay could lead to the loss of important data.

More information

Malware is not just limited to the Microsoft Windows. Devices running iOS, MacOS, Android and Linux operating systems are also at risk. Some malware spreads rapidly from one computer to another, causing disruption and damage. Most come from email or by browsing the internet. Other threats are removable media (such as a USB drives) or individuals remotely connecting to computers or services from infected devices.

Spyware is used to track user input, their activity and steal account passwords or sensitive information.

Ransomware attempts to encrypt personal documents and files, rendering them unreadable unless the victim pays the attacker money to decrypt them.

Back to top