Responsible Computing

Many of us have had a negative computing experience that could have been prevented – a crashed hard drive, a compromised password, or perhaps a computer virus. Often, when a computer system or account is left “unprotected,” the resulting damage can affect others as well.  By following a few simple guidelines, you can greatly increase your chances of avoiding problems of this type in the future.

If you are a new student, please complete the below instructions before coming to orientation.

Quick Links: Securing Your Device | Spyware/Phishing Attempts | Virus Protection | Data Backup

Securing Your Device

Windows 8

Turn off System Restore

System Restore was intended to allow Windows to revert back to a previous working state after a configuration error or system crash. The problem with System Restore is that if your computer is infected with a virus, the computer will continually "restore" the virus information after the antivirus software has cleaned it.

  • Right-click on Computer. Select Properties. (Click to view an example)
  • Click on System Protection.
  • Click Configure.
  • Highlight Local Disk.
  • Click Configure.
  • Click on System Restore. (Click to view an example)
  • Select the Disable System Protection.
  • Click OK.
  • You will get a verification dialog. (Click to view an example)
  • Press the "Yes" button and proceed.
Set Windows to Automatically Update

Set your Windows operating system to automatically update itself when a new critical update is available.

  • When the main tile screen is displayed begin to type "control panel" the system will show the results for what is typed.
  • Select Control Panel.
  • Select Windows Update.
  • On the left select the Change Settings. entry.
  • In the important updates area select the appropriate entry from the drop down. It is recommended that you "Install updates automatically (recommended)".
  • Click on the "Updates will be automatically installed during the maintenance window."  (Click to view an example)
  • From the drop down available in the "Run maintenance tasks daily at:" area select the time that works best for you.
  • Click OK
  • Check the "Give me recommended updates the same way I receive important updates".
  • Click OK.
Turn on Firewall Protection
  • Click on the "Turn Windows Firewall on or off" entry to the left.
  • In both the Private and Public network settings area check:
    • "Notify me when Windows Firewall blocks a new app."
    • Click OK.
Install Anti-Virus Application

Activate Windows Defender in Windows 8.

  • First, head to the modern-style Start screen and type "Windows Defender" to have Windows search for the program, then click on the Windows Defender icon when it appears in the results.
  • A Windows Defender window will appear on the classic desktop. If Microsoft's security software is disabled, you'll seen a red bar with an "At risk" warning and an image of a computer screen with a big X on it. (Click to view an example)
  • Next, click on the Settings tab at the top of the window. Make sure "Real-time protection" is selected in the left pane, then check the box next to "Turn on real-time protection (recommended)."
  • Finally, click Save Changes at the bottom of the Window.

You'll know it worked when the red "At risk" bar at the top of the Windows turns green and switches to "PC Status: Protected." (Click to view an example)

Windows 7

Turn off System Restore

System Restore was intended to allow Windows to revert back to a previous working state after a configuration error or system crash. The problem with System Restore is that if your computer is infected with a virus, the computer will continually "restore" the virus information after the antivirus software has cleaned it.

  • Right-click on Computer. Select Properties. (Click to view an example)
  • Click on System Protection.
  • Click Configure.
  • Highlight Local Disk.
  • Click Configure.
  • Select Turn off system protection.
  • Click Apply.
  • Click OK. (Click to view an example)
Set Windows to Automatically Update

Set your Windows operating system to automatically update itself when a new critical update is available.

  • Click on the round Windows Icon at the lower left corner of your screen.
  • Select All Programs, Windows Update.
  • Select Change Settings.
  • Select the option below that says Install updates automatically (recommended).
  • Set when to install the updates to Every day.
  • Select a time that is convenient for the update(s) to run. (Click to view an example)
  • Click OK.

Important note: If you plan to use Bradley University's secure wireless network, you must have the optional Windows update for root certificates, KB931125, installed. Click Start, All Programs, Windows Updates, check for updates and view optional updates. Select the update and click OK to install, or download the update and install it.

Turn on Windows Internet Firewall
  • Open the Control Panel located in the Start menu, Control Panel or Start Menu, Control Panel, System and Security.
  • Click on Windows Firewall.
  • If your firewall is being managed by Symantec Endpoint, you may skip the following steps.
  • Click Turn Windows Firewall on or off. (Click to view an example)
  • Click Turn on Windows Firewall under each network location that you want to help protect, and then click OK.
Install Anti-Virus Application

To complete the Responsible Computing, you need to install anti-virus software. Click here to for Bradley's free anti-virus recommendations.

Windows Vista

Turn off System Restore

System Restore was intended to allow Windows to revert back to a previous working state after a configuration error or system crash. The problem with System Restore is that if your computer is infected with a virus, the computer will continually "restore" the virus information after the antivirus software has cleaned it.

  • Right-click on Computer. Select Properties.
  • Click on System Protection.
  • Remove the checkmark for all the disks in the Automatic restore points table.
  • Click OK.
  • A System Protection dialog is displayed. Click on Turn System Restore Off. (Click to view an example)
  • Click OK.
Set Windows to Automatically Update

Set your Windows operating system to automatically update itself when a new critical update is available.

  • Click on the round Windows Icon at the lower left corner of your screen.
  • Select All Programs, Windows Update.
  • Select Change Settings.
  • Select the option below that says Install updates automatically (recommended).
  • Set when to install the updates to Every day.
  • Select a time that is convenient for the update(s) to run. (Click to view an example)
  • Check Include recommended updates.
  • Check Use Microsoft Update.
  • Click OK.

Important note: If you plan to use Bradley University's secure wireless network, you must have the optional Windows update for root certificates, KB931125, installed. Click Start, All Programs, Windows Updates, check for updates and view optional updates. Select the update and click OK to install, or download the update and install it.

Turn on Windows Internet Firewall
  • Open the Control Panel located in the Start menu, Control Panel.
  • Click on Security. (Click to view an example)
  • Click on Turn Windows Firewall on or off. (Click to view an example)
  • Make sure that the On radio button is selected.
  • Go to the Exceptions tab. (Click to view an example)
  • From this location you are able to allow various applications access through the firewall. An example is for your electronic mail or antivirus application that is providing new information on a periodic basis.
  • Use the scroll bar to the right to locate the application you wish to allow to have access. If the application is not listed click on the Add Program button. (Click to view an example)
  • Scroll through the list of recognized applications and select (highlight) the one desired. If the application is not listed use the Browse button to locate it on your system. (Click to view an example)
  • Click OK to save the settings.
Install Anti-Virus Application

To complete the Responsible Computing, you need to install anti-virus software. Click here to for Bradley's free anti-virus recommendations.

Mac OS X

Turn On Firewall

Mac OS X has a built-in firewall to prevent hackers from taking control of your computer. Turn on the firewall to protect yourself from these attacks.

  • Click on the Apple logo in the upper left corner of your screen.
  • Select System Preferences from the menu.
  • Select Security from the System Preferences window.
  • Select Firewall from the three tabs.
  • Click the Start button to turn on the Firewall. (Click to view an example)
Configure Software Update
  • Click on the Apple logo in the upper left corner of your screen.
  • Select System Preferences from the menu.
  • Click the Software Update icon.
  • Enable Check for updates and set it to Weekly.
  • When you are notified by Software Update that new updates are available (such as security updates and OS updates), be sure to install them. (Click to view an example)
Install Anti-Virus Application

To complete the Responsible Computing, you need to install anti-virus software. Click here to for Bradley's free anti-virus recommendations.

Linux/other Operating Systems

Install Anti-Virus Application

You must make sure your computer is as safe as possible from attacks. Follow the steps recommended by the manufacturer of your computer operating system to help secure your computer and prevent infection from hackers, spyware and viruses. These steps may include:

  • Updating your operating system
  • Installing an antivirus product
  • Checking your computer for spyware
  • Password protecting your files and system
  • Not running illegal or unnecessary service
  • Monitoring the overall health of your system

If you have any questions about these instructions or would like to know more about securing your computer, call the Technology HelpDesk at (309) 677-2964.

Mobile Devices

Mobile Security

Security measures differ greatly from those taken on computers. Unlike computers, each mobile device has a different procedure on how to protect your data. Some are built in to the operating system and others you have to rely on third party applications. Almost all devices allow you to enable a passcode or PIN in order to gain access to the device. This is one of the easiest ways to ensure that you are protecting the data on your mobile device, but one that the majority of people do not use.

Bradley University highly recommends that you start by setting up a passcode on all your mobile devices that are used to access or store any Bradley University data. We have made it easy for you to setup by following one of the links below.

How to setup a passcode on an iPhone or iPad and protect your data (iOS7)

Setting a passcode helps protect your data stored not only on the device, but also the data you can access from other sources. If the device is either lost or stolen, it will be harder to access that data.

  • Go to SETTINGS on the device and tap on the GENERAL option. (Click to view an example)
  • Under GENERAL tap on PASSCODE LOCK. (Click to view an example)
  • Tap TURN PASSCODE ON. Click to view an example)
  • Enter PASSCODE (enter a passcode that is easily remembered by you, but not easy to be guessed). (Click to view an example)
  • RE-ENTER your PASSCODE. (Click to view an example)
  • Once you have entered your passcode, you are able to change how long it takes for your phone to lock and to require a passcode to unlock.  The default is set to immediately. This is the best option, but if you choose to change it, we recommend not using anything past 5 minutes. If you leave your phone someplace, the longer time you have it set to lock, the longer someone has to gain access to your data and personal information. (Click to view an example)
  • For added protection you can choose to have the device erase all the data automatically after 10 failed attempts to enter a passcode. To do this, just enable the option under the ERASE DATA option under the PASSCODE LOCK setting. (Click to view an example)
How to setup a Google Drive App Passcode on iOS (iOS7)

IRT recommends setting up an additional passcode for the Google Drive App on iOS devices to make sure sensitive information you store in Google Drive is more secure. To set a Google Drive App passcode, please follow the instructions below.

  • Open the Google Drive App
  • Open Drive and click on the 3 Horizontal lines (OPTIONS MENU) in the top left hand corner of the screen (Click to view an example)
  • Click on the GEAR ICON next to the account name to open up the SETTINGS MENU. (Click to view an example)
  • Click on the PASSCODE LOCK option. (Click to view an example)
  • Click to turn ON the PASSCODE LOCK. (Click to view an example)
  • Enter in a NEW PASSCODE. (Click to view an example)
  • Re-enter the NEW PASSCODE to confirm it. (Click to view an example)
How to set up Find My iPhone/iPad (iOS7)

Apple® has made protecting your data and personal information, by including the Find My iPhone/iPad features in the operating system. With just a few simple steps you can have the peace of mind that your data and personal information are protected in case it's lost or stolen. This gives you the ability to remotely erase or lock your iPhone or iPad.

  • Go to SETTINGS on the device and tap on the iCLOUD option. (Click to view an example)
  • Sign in with your Apple ID.
  • Turn on FIND MY iPHONE (Click to view an example)
  • Tap OK on the pop up window. (Click to view an example)
How to remotely lock your iPhone or iPad if it is lost or stolen

All you have to do is log on to https://www.icloud.com/ from any browser with the Apple ID and password that you used to set up FIND MY IPHONE/IPAD. (Click to view an example)

  • Once you have signed in, just click on the FIND MY IPHONE icon. (Click to view an example)
  • After clicking the FIND MY IPHONE button, the website will open another web page with Google maps on it. Click on the DEVICES button in the center of the web site. (Click to view an example)
  • Once you have clicked the DEVICES button, a list of your devices will drop down. Select your iDevice that you want to find, lock or erase.
  • A menu will open on the right hand side of the web site with the name of your iDevice that you selected in the previous step. The first option that if gives you is to PLAY SOUND. This will make the device play a loud sound so that you can locate it if you have lost it nearby.

    The second option is to put the device into LOST MODE which will lock the phone, display a message on the device that it is lost and a contact phone number in case someone finds it.

    The third option that you have is to ERASE IPHONE/IPAD. This will erase ALL data and personal information stored on the device itself. (Click to view an example)
How to enable a password on Android devices

Protecting your data and personal information on an Android 2.2 device is simple, but each Android device may operate a little different. Since Android is just the operating system, each manufacturer's device may have a different menu system for the settings. The images below are generic Android 2.2 menu and are not representational of a particular device.

  • Press the MENU button on the HOME SCREEN and then select SETTINGS on your device. (Click to view an example)
  • Scroll down to the LOCATION AND SECURITY option and press it. (Click to view an example)
  • Locate the SET UP SCREEN LOCK under SCREEN UNLOCK. (Click to view an example)
  • There are 3 options for locking your device for you to choice. Each option will help protect your data and personal information in the event it's lost or stolen. (Click to view an example)
  • Choosing the PATTERN options, allows you to create a unique pattern that you create to unlock your phone. (Click to view an example)
  • Choosing the PIN options, allows you to create a unique PERSONAL IDENTIFICATION NUMBER that you create to unlock your phone. (Click to view an example)
  • Choosing the PASSWORD options, allows you to create a unique PASSWORD that you create to unlock your phone. (Click to view an example)
How to install Google Device Policy app to remote lock or wipe an Android devices

Download Google Apps Device Policy

  • Search for Google Apps Device Policy on Google Play, and press the Google Apps Device Policy icon.
  • Press Install. Android will ask for confirmation giving a list of permissions needed for the Device Policy application to function.
  • Press Install. When installation is complete, press Open to continue.

Set up Device Policy on your phone or tablet

  • Press the install notification or app icon to open the app. If you have multiple Google Apps accounts, select the account you want to set up. The Introduction screen gives an overview of what the app does. Click Next.
  • If you already have your Google Apps account set up with your FSmail email on the phone, select to set up Device Policy with your account. Click OK.
    Note: If you aren't signed in to Google Apps on your Android, you'll be asked to sign in to your account. If you're a 2-Step Verification user, you may need to enter an App password instead of your normal Google Apps password. Learn more about App passwords.
  • Since the Bradley administrator doesn't require device approval, you will be taken to a screen that says "Activate security policies?" Press Activate.
  • Registering device with server and Confirm Enforcement. The screen shows a list of policy settings your administrator is enforcing on your account. Press Enforce.
  • (optional) If you need to change settings, like choosing a PIN for your device, you'll be notified to make these changes before your device is activated.
  • Activating device with server. Your device will activate, and you'll be taken to the Status screen.

You've set up Device Policy! Your Google Apps data (mail, calendar, and contacts) will start syncing to this device. You don't need to do anything more, but you can check out some of the user device management features like remotely locating your device and remotely ringing it if you lose it.

How to remote lock, locate, or erase an Android device.

Note: If you have not installed the Google Device Policy app, you will need to follow the instruction in the above topic.

From any web browser, go to http://www.google.com/apps/mydevices and click on your device.

Use the web interface to:

  • Reset PIN: Resets the PIN you need to unlock your phone.
  • Ring Device: Rings your device at a very high volume for 5 minutes to help you locate it. Your device will ring, even if it's in silent mode or the volume is off.
  • Lock Device: Locks your device. This setting is useful if you lose your device and want to prevent unauthorized access. If you do lose your device, contact your administrator to find out if your administrator should remotely wipe it.
    Note: For certain Android devices that have implemented non-standard lock and screen timeout features, this command just shuts off the screen.
  • Wipe Device: Your Google Apps administrator needs to enable this setting in their control panel for Wipe Device to appear on your My Devices page. When you press this button, a window appears asking you to confirm that you want to remotely wipe your device.
    Note: Pressing Wipe Device and Confirm erases your personal data like mail, calendar, and contacts from your device. However, it may not delete data stored on your device's SD card. Your Google Apps data remains available through a web browser and on other authorized mobile devices. Only wipe your device if you think it's lost or stolen. Please consult with your Google Apps administrator before wiping your device.
  • Locate: Locates your device on a Google Map. This setting works only if the GPS or Wi-Fi location is turned on for the device. With Android 4.0+, you can find these settings on your device under Settings > Location access. Your location is only accessible on this page and never shared with anyone else.
What to do if your mobile device is lost or stolen?

If you have lost or had your mobile device stolen, the first step is to call your phone. It might be near by. If that fails, then you should take preventative measures by changing all of your passwords for all of your personal accounts. This would include: email accounts, website passwords for banking or credit cards, social media sites and applications that are stored on the device.

Try to locate the device and remotely lock it if possible. You should also contact the police and report it stolen.

Please contact the HelpDesk and let us know that the device was lost or stolen, so that we have a record of it and can assist you in any way possible.

Spyware protection with Malware Bytes

What is Spyware?

Spyware is spy software on your personal system. This may vary from keystroke recording programs to additional cookies being placed on your system to report back to different vendors. The application for defense against spyware that has been tested by Bradley University is Windows Defender.

How do I know if I have Spyware?

With the ever-increasing use of spyware by companies, it is almost certain that everyone will get some form of spyware on their computer just by visiting a web site. A few of the common ones are WeatherBug, Gator, P2P Networking, BDE Projector and Instant Time. If you are experiencing network problems such as not being able to log in and not being able to browse the Internet then the problem is most likely related to spyware and not a glitch in the network.

How do I get rid of it and prevent it?
There are a couple of things you can do such as download and run certain software packages like Ad-Aware. Install and run Malware Bytes to check for spyware that may cripple your system.

Download Malware Bytes

Quick Links: Phishing and malware Alerts | Anti-Virus Software

Virus Information and Protection

What is a Computer Virus?

Computer viruses are programs intended to harm your computer system and steal your data. Like biological viruses, they are written to multiply and spread from computer to computer over the network. Viruses generally exploit a security vulnerability in the computer's operating system which allows them to spread and create as much damage as possible. Viruses can shut down entire networks and have been known to cost millions of dollars in lost productivity and lost data. You must protect yourself against these virus attacks by using antivirus software on your computer and by staying aware of any new virus activity. The information below can help protect your computer against these unwanted infections.

Email Security Guidelines

Bradley University IRT will never ask for your user name or password via email. Do not open or provide a response to any email sent to you asking you to "update, change, verify, confirm, etc..." your email information and/or password.

Possible subject lines include:

  • Update your Bradley Account Now
  • Verify Your "Bradley.edu" Webmail Account Now
  • Confirm Your E-Mail Address

Simply delete the e-mail. Never provide personal or account information through an e-mail solicitation, and always delete any e-mail that arrives with this type of request.

The only e-mail request that you will receive from Bradley e-mail administrators will be a notification that your BUnetID password is about to expire, and you will be provided with instructions to change it.

Phishing/Spam Email Red Flags

Think an email that you received is fraudulent? Review this PDF document created to help you recognize the "Red Flags " that a phishing/spam email will contain.

Install Free Anti-virus Software

Since installing excellent Anti-virus software is essential, Computing Services has made some suggestions for different operating systems. To download the FREE Anti-virus suggestions, please click here.

 

 

Data Backup

Data should be backed up on a regular basis. Computer systems traditionally come with one or more of the following internal devices: CD R/W and/or DVD R/W.

External devices available for back up include USB and FireWire (IEEE 1394) hard drives, pin drives and CD and/or DVD R/W. Departmental server storage space in Morgan Hall can be leased at a cost of $550 per year for 50GB. For more information, contact Dave Scuffham (309) 677-3041.


Contact the Technology HelpDesk at (309) 677-2964 for assistance.