{"id":113,"date":"2015-12-03T17:17:29","date_gmt":"2015-12-03T22:17:29","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=113"},"modified":"2015-12-03T17:17:29","modified_gmt":"2015-12-03T22:17:29","slug":"yes-virginia-you-do-need-antivirus-software-for-your-mac","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/12\/03\/yes-virginia-you-do-need-antivirus-software-for-your-mac\/","title":{"rendered":"Yes Virginia, you do need antivirus software for your Mac"},"content":{"rendered":"<p>If you&#8217;re one of those people who think their Mac is absolved from getting viruses, think again.\u00a0 According to this\u00a0<a href=\"https:\/\/www.bit9.com\/company\/news\/press-releases\/mac-os-x-malware-at-all-time-high-research-shows\/\" target=\"_blank\">analysis at Bit9<\/a>, in 2015 alone researchers have discovered five times the amount of unique OS X malware than in the last five years combined.\u00a0 Makes perfect sense due to the growth in popularity of Macs in the business and at home.<\/p>\n<p>Information Technology reminds everyone that all users are required to install an antivirus program on their computers, regardless of the computers\u2019 operating systems. IT offers\u00a0McAfee VirusScan\u00a0software\u00a0for free to all\u00a0UMass Lowell\u00a0students, faculty, and staff.\u00a0 Check out the <a href=\"http:\/\/uml.edu\/IT\/Services\/Software\/default.aspx\" target=\"_blank\">software applications <\/a>page on the IT website for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you&#8217;re one of those people who think their Mac is absolved from getting viruses, think again.\u00a0 According to this\u00a0analysis at Bit9, in 2015 alone researchers have discovered five times the amount of unique OS X malware than in the &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/12\/03\/yes-virginia-you-do-need-antivirus-software-for-your-mac\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/113"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=113"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/113\/revisions"}],"predecessor-version":[{"id":115,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/113\/revisions\/115"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}