Contact Us
Office of Information Technology
4400 Massachusetts Avenue NW
Washington, DC 20016-8019
United States
Advice and Tips
Common ways computers get infected
Malware frequently infects computers through two common approaches:
- Coercing you into installing malware, by representing it as something else, such as: a popular program, false e-mail, or a solution to a problem.
- Exploiting known vulnerabilities in old versions of programs installed on your computer. This is known as a "drive-by" attack, because the malware can attack your computer when you simply visit an infected website.
Tips to prevent infection
OIT uses an asset management tool to push updates to AU-owned computers to mitigate the risks posed by vulnerable programs; however, we do not have the resources to monitor every program in use. thus, we rely on you to install updates to programs, when you are prompted to do so.
- You should carefully consider the source of a program, before installing it.
- Make sure it is coming from a reliable source.
- Please note that the manual download of critical patches will always require a login to the myAU portal, so you can rest assured that they are legitimately from us.
- You should always keep your installed computer programs up to date.
- Always install updates when prompted.
- Trustworthy updates will not generate warnings about security.
- Programs that you do not have installed on your computer do not need to be updated.
- Please note: Many types of malware are not detected by anti-virus software.
Commonly exploited applications
The top most commonly exploited programs include:
- Acrobat Reader
- Flash
- Java
What to do if you think your computer is infected
- Stop and contact the IT Help Desk for guidance, if you think your computer may have malware installed.
- You should immediately change your passwords to your AU accounts, and all personal accounts you have accessed on the infected computer.