BYU offers a BS in cybersecurity, their webspace had better be safe.
Too often that's not a realistic assumption, given how scam sites like Facebook sell paid placement system space to nefarious ad networks, that in turn sell to malware scammers (primary source of those fake BSOD screen hijack "ads"), plus themselves defraud users and government info viewers, among others, with over 300 secretive domains and deceptive info harvesting and sales to third parties. Now if only we could block those, Google/Doubleclick, Equifax, the Infernal Racketeering Scheme, major retailers and medical systems, among others who've caused major data breaches or by design violate users' privacy deceptively....
In this case Jesse V was hired as BYU faculty in 2019, and teaches Python and a couple other "Digital Humanities" dept courses. I'd assume they'd generally fire staff who distributed malware outside closed ecosystems for IT security courses. OTOH, their former IT head perpetrated felony perjury with impunity in testimony related to Congress and ACLU v Reno 1, where he claimed BYU because of its oppressive student rules never distributes porn. Any senior IT person should know every entity with a high level net peering status is contractually obligated to route whatever hits their systems, and the nature of net traffic is that BYU is routing lots of Mormon-proscribed bits.
Of note too is how a junior CompSci faculty with a deer in the headlights photo on his department bio/contact page, has a dead end un-indexed gamer support tool, mainly promoted by his Reddit presence. Not that anyone could or would ever notice?
I may have mentioned this before, but Discord is where lots of gamers hang out, and where they have some major bad system design issues that enable abuses by malware bots. They distribute original files for smaller document and image "previews", and not server generated previews. That allows pushing malware into Discord cache directories in hex sequence cryptic file names stripped of extensions, and not just if a user clicks to actively download. Discord has issued press releases about how rapidly they take down bad actors, but that meant 3-6 weeks for several I reported before they killed nefarious accounts, and far longer when unreported, according to an investigation and report by a security researcher and tech journal that got over 5,000 removed, and found evidence of over 12,000 including some already snuffed. Those risks can be limited by the Elvenar AM's operating servers there, by tight join or new account limit configs, and permissions on graphic posts, out of group mail, and speed restrictions.