Icon for staff resources

Are you an IT staff member?

Staff safety and security

Set up your IT services and security measures as soon as you join U of T.

Protect your passwords

Organize and store your personal and professional passwords in one secure place.

Virtual Private Network (VPN) for secure remote access

Secure remote access to network resources for the U of T community.

Icon for UTORMFA

Enroll in multi-factor authentication (MFA)

Protect your U of T accounts with MFA.

Everyday essentials

Use these resources and tools for your day-to-day cyber security needs.

Working remotely

Keep your data and computing environment safe and secure to protect data, applications, devices and the network.

Data Classification Standard

Understand U of T’s four data classification levels and how to identify, handle and protect data based on its sensitivity and risk.

Data protection

Protect the integrity, confidentiality and availability of data assets.

Travel and device security best practices

Protect your devices, accounts and data with practical steps for safer travel, before departure and throughout your trip.

Stay safe online

Protect yourself from online threats by understanding the types of fraud and adopting preventive measures.

Secure your data while travelling

Protect the safety of your devices and the data they contain from malicious attacks when travelling outside of Canada.

Managing information and resources

Discover strategies to protect yourself and your devices from cyber threats while gaining valuable insights into information security.

Are you looking for guidance to help you classify your data?

Icon for Information Security Handbook

Information security handbook

Follow actionable steps and access support related to common cyber security questions and requirements.

Data asset inventory (DAI) guidance

Record key information about critical institutional data in your unit and the associated people and technology supporting these data assets.

Digital asset classification

Consider the availability of information systems, applications and equipment that handle data (including storage, processing and transmission).

Have questions about risk management?

Guidance and support related to maturing your risk management or identifying and managing risks.