Encryption & Virus Protection

Encryption

Data encryption helps protect information by making it unreadable to unauthorized persons and processes and is an important protection if you or your department deals with UNH sensitive or legally protected data, and particularly if you use laptops off-campus for your work.    

For more information about this program or to schedule assisted encryption on your computer, please Contact ISS.   Installing encryption typically takes less than 20 minutes and you can work normally on your computer while it is being encrypted.  Experienced system administrators may choose to install encryption without ISS assistance and ISS will provide installers upon request of a UNH faculty or staff member. 

If your computer is currently encrypted with TrueCrypt, MS Bitlocker, FileVault or other encryption software, please indicate that when contacting ISS. 

For more information, read: Instructions To Encrypt Windows Computers

Virus Protection

Read about and get UNH virus protection at UNH Campus Virus Protection.  No single anti-virus program provides complete malware protection and use of additional commercial or 'freeware' products such as MalwareBytes or Spybot is strongly recommended.  

UNH ISS also recommends regularly scanning with Microsoft Defender Offline (http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline) for UNH computers that are used to access restricted or sensitive information. MS Defender Offline can detect malware that 'hides' from active scanning anti-virus software and should always be used if a malware infection is suspected.

Custom Fields
  • Department: Information Security Services
Attached Files (1)
Related Articles RSS Feed
Phishing and Spam
Viewed 1649 times since Wed, Apr 29, 2015
Microsoft Security Essentials and Windows Defender Usage
Viewed 3701 times since Wed, Aug 12, 2015
UNH Campus Virus Protection
Viewed 10347 times since Wed, Aug 12, 2015
What’s the Deal with Publicly Posted Credentials?
Viewed 103 times since Thu, Jun 29, 2017
Good Security Practices to Adopt at Work/School, and at Home
Viewed 93 times since Fri, Jul 14, 2017
Mobile Device Health and Security
Viewed 605 times since Fri, Jul 10, 2015
Signs Your Account is Compromised
Viewed 44 times since Wed, Aug 16, 2017
Tips for Keeping Your Devices Secure
Viewed 50 times since Fri, Aug 4, 2017
System Center 2012 Endpoint Protection Windows Usage Instructions
Viewed 1496 times since Wed, Aug 12, 2015
Find sensitive data before the bad folks do!
Viewed 497 times since Mon, Jun 27, 2016
MENU