{"id":2228,"date":"2019-04-22T11:42:09","date_gmt":"2019-04-22T18:42:09","guid":{"rendered":"https:\/\/mlml.sjsu.edu\/its\/?page_id=2228"},"modified":"2020-02-25T09:45:14","modified_gmt":"2020-02-25T17:45:14","slug":"security-anti-malware","status":"publish","type":"page","link":"https:\/\/mlml.sjsu.edu\/its\/security-anti-malware\/","title":{"rendered":"Security &amp; Anti-Malware"},"content":{"rendered":"<div id=\"pl-2228\"  class=\"panel-layout\" ><div id=\"pg-2228-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-2228-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2228-0-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-a1292e3cfd2d-2228\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h3 class=\"sow-headline\">\n\t\t\t\t\t\tSECURITY &amp; ANTI-MALWARE\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"sow-sub-headline\">\n\t\t\t\t\t\tKeeping your accounts and information secure should be a top priority. By implementing best practices for account and network security, you not only protect yourself but also others who are connected to the same network.\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-2228-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-2228-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2228-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4 style=\"text-align: left\">Security Overview:<\/h4>\n<p>In order to best protect yourself against data breaches, ransomware attacks, and other security threats, you must familiarize yourself with the different types of attacks and the best practices to avoid them. To familiarize yourself with basic device security, please read the <a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/information-security-overview\" target=\"_blank\" rel=\"noopener\">Information Security Overview KB page<\/a> in full.<\/p>\n<h4>Recommended Anti-Malware Software:<\/h4>\n<p>To protect your computer it is important to download an <a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/recommended-anti-malware-software\" target=\"_blank\" rel=\"noopener\">antivirus and anti-malware program<\/a> and keep it up to date. Learn about the antivirus\/anti-malware recommended for your device by clicking the links below:<\/p>\n<ul>\n<li>Windows 8 &amp; Newer\n<ul>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-10-help-protect-my-device-with-windows-security\" target=\"_blank\" rel=\"noopener\">Windows Defender<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes Anti-Malware<\/a><\/li>\n<\/ul>\n<\/li>\n<li>MacOS\n<ul>\n<li><a href=\"https:\/\/www.clamxav.com\/\" target=\"_blank\" rel=\"noopener\">ClamXAV<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes Anti-Malware<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4>Secure Password Storage and Management:<\/h4>\n<p>There are many simple methods to securely store and manage numerous passwords, learn about three password managers that MLML IT endorses by clicking on the links below:<\/p>\n<ul>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/secure-password-storage-management#bkmrk-last-pass%3A\" target=\"_blank\" rel=\"noopener\">LastPass<\/a><\/li>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/secure-password-storage-management#bkmrk-1password%3A\" target=\"_blank\" rel=\"noopener\">1Password<\/a><\/li>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/secure-password-storage-management#bkmrk-keepass-and-keepassx\" target=\"_blank\" rel=\"noopener\">KeePass &amp; KeePassX<\/a><\/li>\n<\/ul>\n<h4>Creating Strong Passwords:<\/h4>\n<p>Strong passwords that are a combination of uppercase\/lowercase letters, numbers, and special characters are essential to keeping your accounts secure. Learn tips by clicking the link below:<\/p>\n<ul>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/password-checklist\" target=\"_blank\" rel=\"noopener\">Password Checklist<\/a><\/li>\n<\/ul>\n<h4>2-Factor Authentication (2FA):<\/h4>\n<p>2-factor authentication is one of the best ways to protect your accounts from attacks. It requires a second method, on top of your password, to verify your identity before allowing you to login to your accounts. For example, security questions are considered 2FA. To learn more about 2FA, click <a href=\"https:\/\/www.youtube.com\/watch?v=0mvCeNsTa1g\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>SJSU requires the use of Duo 2-factor authentication to securely login to your accounts, learn how to set up and utilize Duo by clicking the follow links:<\/p>\n<ul>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/set-up-duo-2-factor-authentication\" target=\"_blank\" rel=\"noopener\">Set Up Duo 2FA<\/a><\/li>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/sign-in-with-duo-2-factor-authentication\" target=\"_blank\" rel=\"noopener\">Sign In with Duo 2FA<\/a><\/li>\n<li><a href=\"https:\/\/kb.mlml.calstate.edu\/books\/security-anti-malware\/page\/recovering-duo-2-factor-account\" target=\"_blank\" rel=\"noopener\">Recover a Duo 2FA Account<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Security Overview: In order to best protect yourself against data breaches, ransomware attacks, and other security threats, you must familiarize yourself with the different types of attacks and the best practices to avoid them. To familiarize yourself with basic device security, please read the Information Security Overview KB page in full. Recommended Anti-Malware Software: To [&hellip;]<\/p>\n","protected":false},"author":204,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2228","page","type-page","status-publish","hentry"],"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"MLML IT Services","distributor_original_site_url":"https:\/\/mlml.sjsu.edu\/its","push-errors":false,"_links":{"self":[{"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/pages\/2228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/users\/204"}],"replies":[{"embeddable":true,"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/comments?post=2228"}],"version-history":[{"count":15,"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/pages\/2228\/revisions"}],"predecessor-version":[{"id":2504,"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/pages\/2228\/revisions\/2504"}],"wp:attachment":[{"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/media?parent=2228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/categories?post=2228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mlml.sjsu.edu\/its\/wp-json\/wp\/v2\/tags?post=2228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}