Advice and Tips
Common ways computers get infected
Malware frequently infects computers through two common approaches:
- Coercing you into installing malware, by representing it as something else, such as: a popular program, false e-mail, or a solution to a problem.
- Exploiting known vulnerabilities in old versions of programs installed on your computer. This is known as a "drive-by" attack, because the malware can attack your computer when you simply visit an infected website.
Tips to prevent infection
OIT uses an asset management tool to push updates to AU-owned computers to mitigate the risks posed by vulnerable programs; however, we do not have the resources to monitor every program in use. thus, we rely on you to install updates to programs, when you are prompted to do so.
- You should carefully consider the source of a program, before installing it.
- Make sure it is coming from a reliable source.
- Please note that the manual download of critical patches will always require a login to the myAU portal, so you can rest assured that they are legitimately from us.
- You should always keep your installed computer programs up to date.
- Always install updates when prompted.
- Trustworthy updates will not generate warnings about security.
- Programs that you do not have installed on your computer do not need to be updated.
- Please note: Many types of malware are not detected by anti-virus software.
Commonly exploited applications
The top most commonly exploited programs include:
- Acrobat Reader
- Flash
- Java
What to do if you think your computer is infected
- Stop and contact the IT Help Desk for guidance, if you think your computer may have malware installed.
- You should immediately change your passwords to your AU accounts, and all personal accounts you have accessed on the infected computer.
Contact Us
Office of Information Technology
4400 Massachusetts Avenue NW
Washington, DC 20016-8019
United States