Skip to content Skip to main navigation Report an accessibility issue
Information Security

The Importance of Installing Approved Software



As we navigate the ever-evolving landscape of cybersecurity, it’s crucial for each member of our university to play an active role in maintaining a secure computing environment. Today, we’ll shed light on the significance of only installing approved software on university-owned machines and the impact it has on our collective digital safety.

1. Protecting Sensitive Information

Installing only approved software ensures that we control the applications running on our university systems. This control is essential for safeguarding sensitive information, including research data, student records, and other confidential materials. Unapproved software might introduce vulnerabilities that could be exploited by malicious actors, putting our valuable information at risk.

2. Mitigating Security Risks

Approved software undergoes rigorous evaluation for security vulnerabilities, ensuring that it meets our standards for safety and reliability. Conversely, unapproved software may not have undergone the same scrutiny, leaving our systems vulnerable to various security risks, such as malware, ransomware, or other cyber threats.

3. Maintaining System Stability

Every piece of software interacts with the operating system and other installed applications. Installing unapproved software may lead to compatibility issues, causing system crashes or slowdowns. By sticking to approved software, we maintain the stability of our university-owned machines, promoting a seamless and efficient computing experience.

4. Ensuring Compliance

Universities must adhere to various regulations and compliance standards to protect the privacy and security of our community members. Installing only approved software helps ensure that we remain in compliance with these regulations, avoiding potential legal consequences and reputational damage.

5. Facilitating Timely Updates

Approved software typically comes with a clear update and patch management process, which allows us to stay current with the latest security features and patches and minimizes the risk of exploitation. Unapproved software might lack a structured update mechanism, leaving our systems exposed to known vulnerabilities.

Your Role in Cybersecurity

Your cooperation is vital in upholding the security standards we’ve put in place. Before installing any software on university-owned machines, please consult the OIT Help Desk to verify its approval status. By doing so, you actively contribute to our collective effort in creating a secure and resilient computing environment.

Remember, cybersecurity is a shared responsibility, and each action we take plays a role in enhancing the overall safety of our digital ecosystem. If you have any questions or concerns, please don’t hesitate to reach out to OIT.

Thank you for your commitment to cybersecurity.