أغجاض±²¥

Recommendations For Securing Your Computer

Here are some recommendations to improve your computer security if you’re using a Windows or macOS computer. These recommendations are based on Windows 11 and macOS version 15 (Sequoia). When updated versions of Windows and macOS are released our recommendations are subject to change to include these updates.

ITS will end their support of Windows 10 on September 30, 2025. This is to follow Microsoft’s scheduled end of support of Windows 10 on October 14, 2025.

 

1.  Know about your built-in antivirus and antimalware software

Windows: Windows has a native antivirus and antimalware software called Windows Defender, which is enabled by default. Windows Defender has a “periodic scans” feature which scans for current threats in real-time. This feature can be turned off but we recommend keeping it enabled.

macOS: macOS has a built-in antivirus software, called XProtect, that helps protect your system from known malware and potential threats. XProtect is enabled by default and cannot be uninstalled.

 

2. Keep your operating system, web browsers, and other applications up to date

Regularly updating your operating system and web browsers strengthens your defense against security vulnerabilities. Developers release updates to patch flaws and improve protection. Your computer system and most web browsers support automatic updates, which can help ensure you're always running the latest version.

 

3. Enable your system provided firewall

A firewall acts as a barrier between your computer and potential cyber threats, filtering incoming and outgoing data traffic. A firewall adds an essential layer of security against unauthorized access. 

Windows: Windows firewall is called Windows Defender Firewall. It has two separate settings depending on if you’re connected to a private or public network. Both are highly recommended to keep enabled.

Check if your firewall settings are enabled:

  • Go to Control Panel > System and Security > Windows Defender Firewall
  • Then go to Windows Defender Firewall on or off
  • Make sure to check that both private and public network settings have been enabled.

 

macOS: For macOS, here are some tips on how to utilize your firewall:

Be sure your firewall is enabled:

  • Go to Apple menu > System Settings > Network > Firewall.
  • Check if your firewall is turned on.

 

Configure Firewall Options:

  • "Automatically allow built-in software to receive incoming connections":
  • This setting should be checked to allow Apple-provided applications to receive incoming connections.
  • "Automatically allow downloaded signed software to receive incoming connections":
  • This setting can be enabled for additional security, allowing connections from software that has been digitally signed and verified.

 

Allow Connections for Trusted Applications:

  • You may need to manually allow connections for specific applications that require incoming connections (e.g., some file sharing services or network tools).
  • Apple Support suggests you can allow connections for trusted applications or services by going to System Settings > Firewall > "Allow connections" and selecting the desired application.

 

4. Be cautious when installing browser extensions

Before installing any browser extension, research it thoroughly and confirm it’s from a trusted source. Some extensions may appear useful but can compromise your security or privacy once installed. Here are some tips that will help you review an extension that you want to install:

Research the Developer

  • Well-known publisher: Look for trusted companies or individuals. For example, Google, Microsoft, or well-reviewed independent developers.
  • Official website link: A good extension often links to an official website.
  • Other products: Search if the developer has made other trusted extensions or software.

 Look at Reviews & Ratings

  • Consistent positive reviews: A high number of good reviews over time is a good sign.
  • Detailed user feedback: Look for specific feedback rather than generic praise.
  • Check for red flags: Sudden influx of 5-star ratings or complaints about ads/privacy issues.

 Avoid These Red Flags

  • Poor grammar or vague descriptions
  • Fake or stock profile pictures
  • Sudden name or developer changes
  • Reports of ad injection, tracking, or redirect behavior
  • No recent updates to the extension

 

5. Avoid clicking on suspicious links

Here is some important information to consider when dealing with unknown links:

Cybercriminals often disguise malicious links within legitimate-looking messages to impersonate employers, banks, and websites. These links may arrive via phishing emails, pop-ups, or advertisements in an attempt to gain information. Downloading malicious software can expose your information and account credentials.

What should you do when you come across an unknown link?

  • You can hover your mouse over the link to see the address it will take you to. If the address doesn’t look legitimate, don’t click on it.
  • Instead of clicking a link you can go directly to the intended website by using their home page website address or using a trusted search engine.
  • If a link looks fishy, it’s better to not click on it.

For more information about, and tips to protect yourself from, phishing emails, please visit /infosec/phishing/.

 

6. Enabling data encryption on your computer 

Data encryption is designed to protect the data on your computer. Encryption prevents unauthorized access to your files if your computer is lost or stolen. 

Windows: If you have Windows Pro or Education, you can use Windows’s data encryption tool called BitLocker. To enable BitLocker, please follow these steps:

  • Navigate to Control Panel > System and Security > BitLocker Drive Encryption
  • Click "Turn On". You'll be prompted to choose a method on how to manage your recovery key. This will be used to unlock your disk and reset your password if you forget it. 
  • Select a method to save your recovery key.

If you choose to create a recovery key that’s not connected to your Microsoft account, please save this in a safe and secure location. If you lose access to your recovery key and have forgotten your computer’s account password or are unable to log into your account, you will be unable to recover your data.

 

macOS: macOS’s data encryption tool is called FileVault. This feature has been available since macOS version 10.3 (Panther). Depending on your version of macOS FileVault may not be enabled by default. To enable FileVault, please follow these steps:

  • Navigate to System Settings > Privacy & Security > FileVault
  • Click "Turn On". You'll need to choose a method to unlock your disk and reset your password if you forget it.

If you choose to create a recovery key that’s not connected to your iCloud account, please save this in a safe and secure location. If you lose access to your recovery key and have forgotten your computer’s account password or are unable to log into your account, you will be unable to recover your data.

 

7. Need help?

If you have questions or need assistance with protecting your device, please contact the ITS Help Desk.

 

Please rate the quality of this answer: Poor Fair Okay Good Excellent
Not the answer you were looking for? Try different keyword combinations and if you still can’t find your answer, please .
Article ID: 1917
Created: Tue, 19 Aug 2025 3:32pm
Modified: Tue, 19 Aug 2025 4:47pm