Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Purpose
Keeping your system secure is essential to maintaining productivity, protecting data and intellectual property, and abiding by University and partners' policies and requirements.
Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||
|
Initial considerations
Evaluate possible institutional options.
Consult with your local IT group about whether an institutionally managed system would meet your needs. These systems are managed by technical experts at the University, divisional, or departmental level, allowing you to focus more on the task at hand, rather than maintaining the security of unmanaged systems.
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)
What can I do? (Top 5)
Set up full disk encryption on your devices.
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/3571764/Encrypt+mydata+devices+or+data#%F0%9F%92%BB-Enableand+devices#Enable-or-install-full-disk-encryption-packages-based-on-your-Operating-System.
Establish and follow a backup strategy for your important data.
Install and/or enable end-point protection (antivirus, antimalware, etc.) software.
Keep your devices up-to-date.
Protect devices with unique usernames, strong passwords and/or biometrics.
What else can I do?
Keep an inventory of all devices, data, and services related to your work.
Physically secure your devices and data.
Use secure, encrypted methods to transfer data to and from systems.
Securely destroy data when it is no longer required for your project or subject to retention obligations.
Install ad blocking and/or content filter software.
Notify necessary parties immediately if a device is compromised, lost, or stolen.
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️Additional help
General
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)
Researchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related Related articles
Filter by label (Content by label) | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|