Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Purpose
Security alerts and advisories inform you of possible vulnerabilities to your system or project and can provide you with recommended mitigations and solutions to secure your work.
Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||
|
Initial considerations
Maintain an asset inventory.
Maintain a device and service inventory so you are aware if alerts and advisories are relevant to your systems.
Patch and update frequently.
Ensure that you are regularly (or ideally, automatically) updating and patching your systems, in addition to other practices to maintain a secure system.
What can I do?
Visit Security Matters for issues relevant to the U of T community.
Visit Alerts and Advisories by the Canadian Centre for Cyber Security.
Visit and subscribe to Alerts by the Cybersecurity & Infrastructure Security Agency (US).
Alerts and advisories often link to the Known Exploited Vulnerabilities (KEV) catalogue, which is an authoritative source for vulnerabilities that have been exploited.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Additional help
General
Researchers
https://security.utoronto.ca/services/research-information-security-program/
Related articles
Filter by label (Content by label) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|