Protecting devices

IT devices contain the most important things: data about our work, research and leisure, our contacts, and habits.

Things to know

Viruses

Typical for viruses is that they do not spread actively, but instead enter the system with a file, program, or removable media such as a USB stick and infect other files and programs.

Worms

After settling in the system, they spread actively. For example, they forward themselves via e-mail or spread via unpatched security holes and thus infect other systems.

Trojans

A seemingly harmless program with a hidden damage function is called a trojan or trojan horse.

The virus, worm, or spyware infiltrated by a trojan for instance transmits sensitive data unnoticed, such as credit card numbers or passwords.

Backdoor trojans are particularly dangerous. Here the hacker gains access to other computers via a tool.

Spyware

User behavior, surfing habits, and personal information: Spyware spies and collects digital traces.

Under an apparently useful pretext, malware is installed when a program is downloaded. The infiltrated program spies on the user's behavior or collects data, such as e-mail addresses from address books.

The data is then sold, for example for advertising purposes. Spyware often baits users with free "goodies" such as pretty screensavers or free software.

Ransomware

Ransomware is a blackmail trojan horse.

Data on the hard disk or on network drives is encrypted by the malware and thus blocked. For a ransom the data can allegedly be decrypted again.

Without backup, you are one of the losers.

Keyloggers

This type of malware logs the keyboard input and transmits it to the attackers. In this way, user names, passwords and other confidential data can be spied out.

A keylogger, like any other type of malware, can implant itself in a system as software. However, there are also small, inconspicuous hardware-based keyloggers that can be installed between keyboard and system by an attacker.

Rootkit

These programs go deep into the system and have access to all central functions. They can cleverly bypass or switch off anti-virus programs. They are invisible to users. Here too, the aim often is to steal data and sell it to third parties.

The antivirus program scans files on devices and searches for computer viruses, worms, or trojans.

Since new malware is constantly being produced, it is important to update the antivirus program automatically on a regular basis, at least every hour.

A personal firewall analyses incoming and outgoing data traffic of a device, detects access attempts, and can prevent them.

Most conventional operating systems such as Windows and Mac OS have a built-in firewall.  

A public WLAN is insecure in principle.

Incoming and outgoing data can be read by other users of the network.  

Configuration and maintenance

Trusted software

Only install software from trusted sources.

It must be licensed correctly in any case. This also applies to open source software.

Updates

  • Always install updates of firmware, operating system, and all installed applications and apps on all devices as soon as possible.
  • Remember that in most cases a reboot is necessary for an update to become active.
  • If possible, configure your devices to automatically download and install updates.
  • Manually check for updates from time to time and install them. Especially firmware is often not distributed via automatic updates.

Uninstalling unused software

Get rid of software that you no longer use. Uninstall it according to the manufacturer's instructions.  

Use an anti-virus program, such as Sophos, Windows Defender or others.

  • If your equipment is managed by an IT support group, virus protection should be installed. If in doubt, ask.
  • Make sure that the program is updated regularly, at least every hour.
  • Occasionally, check when the last updates were downloaded. In most cases, you can find out by clicking on the program icon.
  • Do not deactivate the virus protection.

Switch on the personal firewall of your system or ask your responsible IT support for assistance.

Some devices, or operating systems, are delivered with passwords preset by the manufacturer.

Change them to secure, long passwords.

Encrypt your hard disks and SSDs.

Your local IT support can help you with this.

If you want to dispose of a device or pass it on to others, make sure that you first irretrievably delete all data.

  • Delete the storage media completely.
    Follow the manufacturer's recommendations or contact the responsible IT support.
  • Also pay attention to the accounts (AppleID etc.) stored on the devices.

If you are unsure, you can contact your local IT support or follow the manufacturer's recommendations.

During use

Do not leave your mobile devices unattended. Take them with you or lock them in.

  • Protect all devices with passwords, PINs, fingerprint, FaceId or similar mechanisms.
  • Use a screen lock that is automatically activated after a few minutes of inactivity and can only be turned off again with your fingerprint, password or similar.
  • If you work a lot on the road, a screen filter protects you from prying eyes. Your responsible IT support can help you with this.
  • Cover your web camera with a webcam cover.

USB stick found? A stranger asks you to plug in the external hard drive for a moment? No!

Only connect external data carriers to your devices if you are sure that  they are from a trustworthy source.

Check - especially on unknown computers - whether a suspicious device is connected between mouse, keyboard, and computer. This could be a hardware keylogger.

If in doubt, do not log-onto personal or sensitive services such as ETH Zurich IT services, e-mail, online banking, or PayPal.  

Effective protection in a public WLAN is provided by transport encryption: Use VPN to connect to ETH Zurich.

JavaScript has been disabled in your browser