|Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.|
Disconnect the machine from the network.
Contact your department technical support person, ITAC or Information Security at Texas State University immediately for further guidance.
Depending on the situation, you may be required to use a different machine to change any passwords that may have been compromised.
Disconnect your computer from the internet.
By removing the internet connection, you prevent an attacker or virus from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files, or using your computer to attack other computers.
Perform a manual scan of your entire system.
You will need to run a manual scan of your entire system with anti-virusIf you do not have anti-virus software, you can purchase it at a local computer store.
Reinstall your operating system
If the software can't locate and remove the infection, you may need to reinstall your operating system, usually with a system restore disk that is often supplied with a new computer.
**Note that reinstalling or restoring the operating system typically erases all of your files and any additional software that you have installed on your computer. After reinstalling the operating system and any other software, install all of the appropriate patches to fix known vulnerabilities.
Make sure to always back up your machine periodically.
Enable all local firewall settings from your machine
Install antivirus, anti-malware, any ad blockers and possibly anit-spyware software.
Keep your machines and mobile devices update to date with the lasted software patches and updates.
Contact ITAC for any assistance, whether for your workstation or personal machine.