Encryption & Virus Protection

Encryption

Data encryption helps protect information by making it unreadable to unauthorized persons and processes and is an important protection if you or your department deals with UNH sensitive or legally protected data, and particularly if you use laptops off-campus for your work.    

For more information about this program or to schedule assisted encryption on your computer, please Contact ISS.   Installing encryption typically takes less than 20 minutes and you can work normally on your computer while it is being encrypted.  Experienced system administrators may choose to install encryption without ISS assistance and ISS will provide installers upon request of a UNH faculty or staff member. 

If your computer is currently encrypted with TrueCrypt, MS Bitlocker, FileVault or other encryption software, please indicate that when contacting ISS. 

For more information, read: Instructions To Encrypt Windows Computers

Virus Protection

Read about and get UNH virus protection at UNH Campus Virus Protection.  No single anti-virus program provides complete malware protection and use of additional commercial or 'freeware' products such as MalwareBytes or Spybot is strongly recommended.  

UNH ISS also recommends regularly scanning with Microsoft Defender Offline (http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline) for UNH computers that are used to access restricted or sensitive information. MS Defender Offline can detect malware that 'hides' from active scanning anti-virus software and should always be used if a malware infection is suspected.

Custom Fields
  • Department: Information Security Services
Attached Files (1)
Related Articles RSS Feed
UNH Campus Virus Protection
Viewed 20537 times since Wed, Aug 12, 2015
System Center 2012 Endpoint Protection for Mac Usage Instructions
Viewed 2884 times since Wed, Aug 12, 2015
Phishing and Spam
Viewed 5097 times since Wed, Apr 29, 2015
Microsoft Security Essentials and Windows Defender Installation
Viewed 23840 times since Wed, Aug 12, 2015
SEED: Accepted Equipment List & Disposal Guide
Viewed 2871 times since Tue, Apr 28, 2015
Good Security Practices to Adopt at Work/School, and at Home
Viewed 674 times since Fri, Jul 14, 2017
System Center 2012 Endpoint Protection for Mac Installation
Viewed 4475 times since Wed, Aug 12, 2015
Why Can’t I Forward Emails to Phishing.Report@unh.edu?
Viewed 304 times since Thu, Feb 22, 2018
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 2515 times since Mon, Apr 27, 2015
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 2194 times since Mon, May 4, 2015
MENU