Recommended AntiVirus Software
(Information taken from: https://www.microsoft.com/en-us/windows/windows-defender)
Windows Defender is built-in to Windows 10. There's nothing to buy and nothing to install. No configuration, no subscriptions, and no nagware. Keep your PC safer with the free, trusted antivirus protection built-in to Windows 10.
When your PC is protected by Windows Defender Antivirus you are receiving comprehensive protection for your system, files and online activities from viruses, malware, spyware, and other threats. Peace of mind has never been this easy.
- Virus protection and removal
- Malware protection and removal
- Spyware detection and removal
- Boot-time protection
- Real-time protection
- Cloud-based protection
- Network inspection
- FREE automatic updates*
Microsoft Security Essentials
(Information taken from: https://www.microsoft.com/en-us/download/details.aspx?id=5201)
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It's easy to tell if your PC is secure — when you're green, you're good. It's that simple.
Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.
*Your PC must run genuine Windows to install Microsoft Security Essentials.
Other Anti-Virus Software
If you'd prefer not to use Microsoft Security Essentials, you may also choose from one of the following free anti-virus solutions:
Your network password provides access to a variety of services: email, office 365 downloads, lab computer use, Moodle and the wireless network.
The first line of being secure is a password. Having a secure password is critical in today's world. You should never give your password to anyone or even share it with a friend. Here are our recommendations for a secure network password:
- Make it at least eight characters long
- Upper and lower case letters, numbers and punctuation
- Do not use the same password on different sites.
- Consider using a pass phrase:
To change your network password please go to this link.
Phishing email messages, websites, and phone calls are designed to steal access. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off your computer. They also can become you on the internet and send messages that appear to come from you.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off a website.
King's IITS uses a variety of techniques to prevent phishing messages, however some phishing messages do come through.
What does a phish message look like? There are a few things to tip you off that the message is a phishing message, See the example below:
- The sender may not have a King's email address.
- There may be misspellings or poor grammar in the message.
- You will be asked to visit a website or email your info to a non-King's address.
- The sender will have a different name than the person whose name appears in the signature.
- King's College IITS will never ask for your username, password or personal information. You will never be asked to update or upgrade your email.
This is an actual phishing message King's received. The link and the address have been changed: