The first link in protecting the security of information at USF begins with every computer on campus and at home. USF-owned Windows computers have antivirus, backup and file encryption software installed by default.
Because many of you work on USF data or projects on your personal computers as well, please take the time to review the minimum steps that will not only protect USF information but keep your computer running smoothly as well.
University-owned Computers are:
- Configured with Sophos AntiVirus software installed and set to update regularly
- Configured to automatically download and install Windows, Microsoft Office, and Mac OS updates (as applicable)
- Other software may be updated automatically via Ivanti
- Configured to keep Windows Firewall on (if applicable)
- Required to be secured by a cable lock
- Required to have their hard drives securely wiped when retired
- Required to be regulary backed up using USF's online backup service
- Required to run USF standard data encryption software (Sophos Enterprise Encryption)
For personally owned computers, ITS recommends the following:
- Use anti-virus software. Sophos AntiVirus is available for free for personally owned computers. Make sure your antivirus software is set to receive regular virus definition updates. Most computers come with an AV application, but once the initial subscription expires, you no longer receive the upgrades that keep it up to date against current viruses.
- Back up your files regularly. Carbonite is USF's enterprise backup solution, but you can also purchase a personal cloud backup subscription. This will provide you with a convenient way to protect important files stored on your personal computer.
- Keep your operating system (OS) up to date:
- Enable the firewall to protect your computer from unauthorized access
- Determine if your apps are up to date by installing and running the Qualys On Demand Scan Agent via your Internet browser. The Qualys On Demand Scan Agent is a software tool that performs a security assessment of your computer by scanning for vulnerabilities and other security-related checks. It will also provide recommended steps to fix any vulnerabilities.