PCs and Macs are targets of cybercriminals. They exploit your devices to steal your data and use your device to attack others. Here are some things you can do to help ensure that you are not a victim.

Run an endpoint security (anti-virus) solution

You should always utilize the departmental solution for university-owned and managed systems. UCSB has a license for Trellix Endpoint Security, which is delivered through campus IT departments and is available for Mac, Windows and Linux OSes. 

Windows 10 and 11 include Windows Defender, which provides basic anti-malware service.

Commercial solutions are available for the Mac. Sophos also provides a free solution for personal use: https://home.sophos.com/. Clamxav is another option that offers a substantial discount to education users: https://www.clamxav.com/education.html.

Use a personal firewall

  • Both Windows and Mac systems include firewalls.
  • For Windows, mark new networks as public.
  • For Macs, set the firewall to block all incoming connections when you are using public networks.

Keep your system updated

  • The latest versions of Windows and Mac OSX include security capabilities not present in earlier versions. You should consider updating to the latest version of the OS.
  • Set automatic updates and accept them when they become available; don’t delay.
  • Update all other software on your device, like Microsoft Office, because it can also get attacked.
  • Web browsers must also be up to date. Many include auto-update features.
  • It is vitally important to keep Java up-to-date. This is a vector for a great deal of malware. Update it in a timely fashion.

Back up your device

  • Configure automatic backups to external drives, a Mac Time Capsule, or online services. You can also back up to online storage, such as Box or Google Drive.

  • It’s always a good idea to make periodic backups to an external drive separate from other backup solutions. Backups fail and some malware will render data on attached drives unusable. Having a separate backup will address these problems.

Use encryption when it is available

  • Some versions of Windows 10/11 include BitLocker full disk encryption. These require that a trusted platform module (TPM) be installed on your computer. Many newer PCs have a TPM, and you should enable BitLocker if it is supported. Ensure that you generate a recovery key and keep it safe.
  • Mac OS includes File Vault, which can easily be turned on from System Preferences. A recovery key will be generated when File Vault is first used. Keep the key safe.

Keep physical control of your device

  • For laptops and tablets, keep your device with you when possible.

  • Lock the device in a secure location when it is not possible to keep it with you.

  • Some devices work with locking devices (Kensington locks).
  • Always set your PC or Mac to lock after a few minutes of inactivity. Require a password to unlock the device.