StartSafe Recommendations for Personally Owned Windows, Macintosh, and Linux Computers (e.g. home and residence hall computers )
Phishing is as serious a problem as computer viruses. Learn how to avoid fake e-mail and web sites and protect both your JMU and personal accounts. View the video and take the IsItReal? game challenge.
JMU Highly Confidential data (e.g. SSN, banking account numbers, credit cards) about people other than yourself must not be stored on personally owned devices. Any unauthorized storage of JMU Highly Confidential or Protected Data is a violation of university policy. Such data must not be stored in a way that it is exposed to unauthorized access physically or electronically.
MacIntosh OS-X Computers (see Mobile section for recommendations for iPad, iPhone, etc)
Windows versions prior to Windows Vista are no longer supported by Microsoft and are not safe to use as Microsoft no longer provides security updates for these vrsions. Unsupported versions include XP, Windows 2000, and Windows ME/98/95/NT. These computers may be disconnected from the JMU network without warning.
Microsoft Office versions prior to Office 2003 Service Pack 3 are no longer supported by Microsoft and are unsafe to use due to the absence of security updates.
This step will fix defects in Windows software that allows criminals take control of our computers (including our privacy, our identity, our network, etc.). This step can be time consuming because there are so many security updates to install, particularly for older computers. A later StartSafe step will have you configure your computer so it keeps itself up to date automatically.
You must repeat the process until you are told that no more critical updates are available. Doing it once may leave your system vulnerable.
To update your Windows 8 computer:
To update your Windows 7 or Windows Vista computer:
Older Microsoft Windows operating systems ( XP, 2000, 95, 98, ME, NT ) are no longer supported by Microsoft. As a result, security updates are no longer provided for these versions and they are not safe to use on a network.
Once you have installed all critical Windows updates, you will need to install new updates that are released throughout each week. You can do this manually (not recommended) or you can configure Windows Update to download and install the updates for you (recommended). Your computer will check for updates, download them, install them at a time specified by you, and reboot all on its own. If your computer is turned off at your selected installation time, it will perform the installation the next time it is powered on.
To set up the automatic updates, follow the instructions at Microsoft's Automatic Update Site. Windows Vista, Windows 7, and Windows 8 computers are setup for automatic updates by default.
Anti-virus software must be installed to protect you from criminally written programs that you may inadvertently run on your computer or that criminals may force on your computer by using unknown defects. JMU has purchased a site license for Symantec Endpoint Protection anti-virus software that allows all faculty, staff, and students to use it both at the office and at home. The advantage of using this software is that it is provided pre-configured to offer the best security and is fully supported by the JMU Helpdesk. TO PREVENT PROBLEMS, ALL OTHER ANTIVIRUS SOFTWARE SHOULD BE UNINSTALLED FROM YOUR COMPUTER before installing Symantec.
The Symantec anti-virus software can be downloaded from the JMU Computing Downloads web page.
Having anti-virus software does not protect you from new viruses that are released daily. A clean virus scan of a program does not mean it's safe to run.
You cannot legally install or distribute the JMU licensed Symantec anti-virus software on computers owned by people who are not current students or employees of JMU. Microsoft offers a product called Microsoft Security Essentials that is free for home computers.
Windows hides a files complete name making it easy for virus writers to fool you. It also makes it difficult to change a file’s name. You can configure your computer to show the full name of most files by making the simple change below.
On Windows 8 computers:
On Windows 7 and Windows Vista computers:
Step 5 - Install security updates for other software you may have installed ( e.g. iTunes, Winamp, Firefox, QuickTime, RealPlayer, Skype, Flash, Adobe Acrobat Reader )
People often add programs to their Windows computer. Many of these programs have security defects that can allow criminals and viruses to take control of the computer. In fact, these programs are currently more often the target of attacks and more responsible for infections than Microsoft software. A partial list of programs installed on a Windows computer can be found in the 'Add or Remove Programs' Control Panel.
Download locations for programs commonly installed that have serious and/or actively exploited security defects are listed below:
Keeping track of all your installed software and needed updates is tedious, time consuming, and errorprone. The company Secunia makes a product that can help with this task and has had favorable reviews. They offer a web based service you can visit with a browser that will check your computer for needed updates for a few dozen of the most popular programs. If you want, they will email you reminders on a periodic basis to rescan your computer. They also offer a more comprehensive program that can be downloaded and installed on home computers that can check for updates for thousands of programs. As always when using a web service that requires downloading software, the terms and conditions and privacy policies should be examined.
Set your screen saver up so that you're required to type your password before it will unlock.
Standard accounts for day to day use on Windows are safer and easy to setup. If you want one more step that will reduce risk more effectively than many of the other recommendations, set up a “standard” account on your Windows 7 or Windows 8 computer for day to day use rather than an Administrator account ( procedure for Windows XP is similar except that the account is called 'limited' instead of 'standard').
Many of today's viruses and spyware will not install when using such an account. If they do install, their damage should be limited. If you don't use such an account, the chances are high your computer will be infected with Spyware and other unwanted programs.
Once you have set up your computer in a way that will protect it and you, it is important to realize that your operating habits can reverse all the work you've done and allow criminals or viruses to take control of your computer or information. Please review the JMU Computing Security web page for guidelines on operating it in a safe manner, common mistakes, and current threats and issues.
JMU Highly Confidential data (e.g. SSN, banking account numbers, credit cards) about people other than yourself must not be stored on personally owned devices. Unauthorized storage of JMU Highly Confidential or Protected Data is a violation of university policy. Such data must not be stored in a way that it is exposed to unauthorized access physically or electronically.