Information Security

Endpoint Protection

UCA uses the Microsoft Endpoint Protection to protect UCA computers from viruses and other malware. IST installs this application on all UCA computers.

Security Options

If you do not currently have current security software on your personal computer, refer to the Knowledgebase article Recommended antivirus applications.

Removing Computer Threats

If you notice any threats or suspicious activities, always contact the IST Help Desk immediately. IST staff are only allowed to remove threats from university-owned computers and devices. However, the Help Desk can help determine if a threat is legitimate and/or recommend applications for removing threats on personally-owned devices.

To help keep your device safe, it is helpful to know the different types of threats. For more information, refer to the Knowledgebase articles below: