Protect your device from digital threats

Malware, viruses and other malicious content are a major threat to your device. They can slow it down, damage or steal your files, or stop it working altogether. 

Antivirus tools help but they’re only part of the solution. With a few simple steps, you can protect your device from common threats and keep it running smoothly.

Common threats

Malware, such as a virus, is any program designed to harm your device or steal your information. It can sneak in through infected files or links, like in emails or downloads. Out of date software and malicious links can also leave your device vulnerable. 

Examples include:

  • Phishing scams try to trick you into giving away sensitive details.
  • Viruses spread from one device to another, infecting them and causing damage.
  • Ransomware locks your files and demands payment to unlock them. 
  • Spyware secretly monitors what you do, including what you type, to steal personal data like passwords and banking details.
  • Adware floods your device with unwanted ads and can redirect you to malicious websites and phishing scams. 
  • Browser hijackers, a specific type of adware, change your browser settings, eg homepage or search bar, to make the redirect less noticeable.
  • Potentially unwanted programmes (PUPs) slow down your device or display unwanted ads. They often come from software you may not have knowingly installed.

Set up protection

You can use simple settings and tools to help stop threats.

Personal or unmanaged devices

Devices that are not managed by IT Services. They might be your own personal laptop or phone, or a University-owned device managed by your department. 

It’s your responsibility to:

  • Keep devices up to date:
    Set up automatic updates so your device gets the latest security fixes as soon as they’re available. 
  • Use antivirus tools:
    Use a trusted tool from an official source. Many tools protect against a wide range of malware, not just viruses. 
  • Check your firewall is turned on:
    A firewall acts as a shield, protecting your device from malicious traffic and common threats, such as malware, hacking attempts and unauthorised access.
  • Register your personal devices:
    All staff and graduate teaching assistants must register every personal device that accesses key University systems, including Google Workspace and Slack. This is part of the University’s Bring Your Own Devices (BYOD) process and helps protect University data.

Managed devices 

Managed devices are University-owned devices and managed by IT Services.

Managed devices are already set up with protection. These devices:

  • update automatically
  • perform regular scans for viruses and other malware
  • have firewalls turned on.

How to avoid threats 

Good protection is important but avoiding malicious content in the first place is even better. Always stay alert to potential risks and take steps to avoid threats. Here’s how to stay safe online.

Be cautious with links

Don't click suspicious links or open unexpected attachments. Phishing messages often try to trick you into doing this.

Be extremely cautious with USB devices

USB devices like memory sticks and external hard drives can carry malware that activates as soon as they’re plugged in. Only use devices you trust. Never connect a USB device that you find or don't recognise. 

If you’re concerned about a USB device that you’ve already plugged in, you should scan it for malware.

Do regular training

Stay informed about the latest scams and threats. Training can help you recognise common pitfalls and spot potential attacks before they happen. 

Follow our cyber security basics

A few simple golden rules can help you stay safe online, both at the University and in your personal life. 

What to do if your device is infected

Signs your device is infected

There are common red flags to look out for. 

  • Pop-ups: you get a lot of unexpected ads on sites or repeated error messages.
  • Unfamiliar apps: new apps appear that you don't remember installing.
  • Browser changes: your homepage, search engine or toolbar changes without your permission.
  • Slow performance: your device seems sluggish, takes longer to load apps, freezes or crashes. You might also find the device's battery drains faster.

If a device is confirmed to be infected, we will block it from the network as soon as it is detected to protect other users and University systems. Access will only be restored once the device has been verified as secure.

Steps to take

Managed devices are protected by CrowdStrike 24 hours a day, seven days a week. CrowdStrike detects and automatically removes infections, without needing action from us. If you’re unsure, report it anyway.

  1. Contact IT Services immediately. Phone or visit us on campus for the fastest help.
  1. Keep your device powered on. Powering off can prevent your device from activating defensive mechanisms.
  2. Disconnect it from the internet. This stops the malware from spreading any further.
  3. Stop using the device. This prevents malware from recording your keystrokes and inputted data.
  4. Check external storage. If you’ve used a USB stick or external hard drive, scan it for malware before connecting it to another device.

Cyber awareness: bite-sized training for staff

Recognise common pitfalls and spot potential attacks before they happen. Courses are available through our training platform, MetaCompliance.

Improve your cyber awareness