Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Purpose

Keeping your system secure is essential to maintaining productivity, protecting data and intellectual property, and abiding by University and partners' policies and requirements. 


Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel3
include
outlinefalse
indent
styledefault
excludePurpose|Audience|On this page|Search|Additional help|Related articles
typelist
class
printablefalse

Initial considerations

Evaluate possible institutional options.


What can I do? (Top 5)

Set up full disk encryption on your devices.

Establish and follow a backup strategy for your important data.

Install and/or enable end-point protection (antivirus, antimalware, etc.) software.

Keep your devices up-to-date.

Protect devices with unique usernames, strong passwords and/or biometrics.


What else can I do?

Keep an inventory of all devices, data, and services related to your work.

Physically secure your devices and data.

Use secure, encrypted methods to transfer data to and from systems.

Securely destroy data when it is no longer required for your project or subject to retention obligations.

Install ad blocking and/or content filter software.

Notify necessary parties immediately if a device is compromised, lost, or stolen.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Sue McGlashan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


Additional help

General

https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Contact+us#Information-Security-(IS)

https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/4948958/Contact+us#Information-Technology-(IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
max10
maxCheckboxfalse
showSpacefalse
reversefalse
excerptTypesimple
cqllabel in ( "protect" , "backup" , "encrypt" , "secure" ) and title !~ "best practices"