Protecting devices
IT devices contain the most important things: data about our work, research and leisure, our contacts, and habits.
Things to know
Viruses
Typical for viruses is that they do not spread actively, but instead enter the system with a file, program, or removable media such as a USB stick and infect other files and programs.
Worms
After settling in the system, they spread actively. For example, they forward themselves via e-mail or spread via unpatched security holes and thus infect other systems.
Trojans
A seemingly harmless program with a hidden damage function is called a trojan or trojan horse.
The virus, worm, or spyware infiltrated by a trojan for instance transmits sensitive data unnoticed, such as credit card numbers or passwords.
Backdoor trojans are particularly dangerous. Here the hacker gains access to other computers via a tool.
Spyware
User behavior, surfing habits, and personal information: Spyware spies and collects digital traces.
Under an apparently useful pretext, malware is installed when a program is downloaded. The infiltrated program spies on the user's behavior or collects data, such as e-mail addresses from address books.
The data is then sold, for example for advertising purposes. Spyware often baits users with free "goodies" such as pretty screensavers or free software.
Ransomware
Ransomware is a blackmail trojan horse.
Data on the hard disk or on network drives is encrypted by the malware and thus blocked. For a ransom the data can allegedly be decrypted again.
Without backup, you are one of the losers.
Keyloggers
This type of malware logs the keyboard input and transmits it to the attackers. In this way, user names, passwords and other confidential data can be spied out.
A keylogger, like any other type of malware, can implant itself in a system as software. However, there are also small, inconspicuous hardware-based keyloggers that can be installed between keyboard and system by an attacker.
Rootkit
These programs go deep into the system and have access to all central functions. They can cleverly bypass or switch off anti-virus programs. They are invisible to users. Here too, the aim often is to steal data and sell it to third parties.
Configuration and maintenance
Trusted software
Only install software from trusted sources.
It must be licensed correctly in any case. This also applies to open source software.
Updates
- Always install updates of firmware, operating system, and all installed applications and apps on all devices as soon as possible.
- Remember that in most cases a reboot is necessary for an update to become active.
- If possible, configure your devices to automatically download and install updates.
- Manually check for updates from time to time and install them. Especially firmware is often not distributed via automatic updates.
Uninstalling unused software
Get rid of software that you no longer use. Uninstall it according to the manufacturer's instructions.
Use an anti-virus program, such as Sophos, Windows Defender or others.
- If your equipment is managed by an IT support group, virus protection should be installed. If in doubt, ask.
- Make sure that the program is updated regularly, at least every hour.
- Occasionally, check when the last updates were downloaded. In most cases, you can find out by clicking on the program icon.
- Do not deactivate the virus protection.
If you want to dispose of a device or pass it on to others, make sure that you first irretrievably delete all data.
- Delete the storage media completely.
Follow the manufacturer's recommendations or contact the responsible IT support. - Also pay attention to the accounts (AppleID etc.) stored on the devices.
If you are unsure, you can contact your local IT support or follow the manufacturer's recommendations.
- Protect all devices with passwords, PINs, fingerprint, FaceId or similar mechanisms.
- Use a screen lock that is automatically activated after a few minutes of inactivity and can only be turned off again with your fingerprint, password or similar.
- If you work a lot on the road, a screen filter protects you from prying eyes. Your responsible IT support can help you with this.
- Cover your web camera with a webcam cover.
Effective protection in a public WLAN is provided by transport encryption: Use VPN to connect to ETH Zurich.