Skip to main content

Notice: Instructure Security Incident & Canvas Updates

Yale ITS is monitoring a reported cybersecurity incident affecting Instructure, the vendor behind Canvas. At this time, there is no known significant impact to Canvas services at Yale, and updates will be shared as more information becomes available.

Read More

Critical vulnerability in all versions of Linux.

Critical vulnerability in all versions of Linux. Please check with your vendor for updates and plan to apply patches as soon as possible. For more information, see: https://xint.io/blog/copy-fail-linux-distributions

Read More

Stay Safe

Man at a laptop in an office

Outsmart the Internet

We rely on technology and the internet for almost everything. More and more, the line between our work life and personal life seems blurred.

The more time we are online, the more likely we risk bad actors getting hold of our private information. But there are simple steps we can take to protect our information and outsmart the Internet.

We're here to help you stay safe so you can do what you do best—pursue your research, teach or study.

Know Your RiskKnow Your Risk Icon

How do you know if you work securely? Knowing the risk of the data and IT Systems you use is the first step.

Click with CautionClick with Caution icon

How do you know if an email is legit or a scam? Learn to be suspicious and how to spot scams.

Apply UpdatesApply Updates Icon

Ever delay installing an update on your laptop or mobile device? Most of us have. Install regular updates to keep your systems safe.

Protect Your IdentityUse Secure Passwords Icon

Ever use the same password for many applications? This can put your information at risk. Learn how to create strong passwords and use MFA to protect what belongs to you.

How-to Guides

Our guides help you make sense of a variety of Information Security topics.

View How-To Guides

 

Get help

Need assistance with an Information Security issue? We're here to help.

Review our Get Help page for easy access to commonly requested security tasks.

Visit the Information Security Get Help page