Antivirus and Malware
Malware is short for malicious software, meaning it can be used to compromise computers, steal information, bypass access controls and cause harm to your computer.
- Contact the IT Service Desk on +44 (0)117 328 3612 immediately if you suspect that your UWE Bristol computer is infected with a virus. Any delay could lead to the loss of important data (see below for 'Signs your computer may be infected').
- Ensure your personal computer is running the most up to date version of antivirus.
- Always scan removable media (eg USB drives) before using it. If the USB is from an unknown source do not plug it into your device.
- Always save email attachments and scan for viruses before reading or opening.
- Always scan files downloaded from the Internet.
The above steps scanning for Malware and updating antivirus software happens automatically on UWE Bristol managed computers. However, if you are not sure, you can manually scan for viruses by following the Bitdefender Endpoint Security Tools for Windows guide. For guidance with your personal antivirus software, consult the manufacture's website.
- Click on links in suspicious emails or those from unknown sources.
Signs your computer may be infected:
- Problems connecting to networks.
- Computer freezing, suddenly slow to respond or crashing.
- Modified or missing files.
- Appearance of strange files, programs or desktop icons.
- Emails or messages sent automatically.
If you suspect any of the above
Contact the IT Service Desk on +44 (0)117 328 3612 immediately if you suspect that your UWE Bristol computer is infected with a virus. Any delay could lead to the loss of important data.
Malware is not just limited to the Microsoft Windows. Devices running iOS, MacOS, Android and Linux operating systems are also at risk. Some malware spreads rapidly from one computer to another, causing disruption and damage. Most come from email or by browsing the internet. Other threats are removable media (such as a USB drives) or individuals remotely connecting to computers or services from infected devices.
Spyware is used to track user input, their activity and steal account passwords or sensitive information.
Ransomware attempts to encrypt personal documents and files, rendering them unreadable unless the victim pays the attacker money to decrypt them.