²ÝÝ®ÎÛÊÓƵµ¼º½

Education Commons

Cybersecurity Awareness Month 2024

Cybersecurity Awareness Month

Learn how to protect yourself, your data and the ²ÝÝ®ÎÛÊÓƵµ¼º½ Community.

Welcome to Education Commons

As a community partner & digital leader, Education Commons enables the ²ÝÝ®ÎÛÊÓƵµ¼º½ community with IT services and solutions in the pursuit of Discovery.

Ways to Contact Education Commons

Review our Services

Discover our range of services by filtering the list using keywords, service type, or user category.

Connect one-on-one with an Education Commons expert on Zoom. 

Hours of Operation
Monday-Friday: 11:00 am - 3:00 pm EST

Start a one-on-one chat session with Education Commons.

Hours of Operation
Monday-Friday: 11:00 am - 3:00 pm EST

Please visit our online service hub if you have technical difficulties or need IT support or resources. There, you can submit a ticket and our team will address your concerns promptly. 

Contact Us

Education Commons can be reached through various channels of communication.

Recent News & Updates

²ÝÝ®ÎÛÊÓƵµ¼º½ 17, 2024

Spotlight of the week: Outdated and Unpatched Devices Risk

Devices that are end of life, aka no longer supported by the manufacturer or service providers, no longer receive firmware updates and therefore are not suitable for current times where vulnerabilities can be exploited without necessary security updates.
²ÝÝ®ÎÛÊÓƵµ¼º½ 11, 2024

Safeguarding your device

Every computer that connects to the ²ÝÝ®ÎÛÊÓƵµ¼º½ network is a vulnerability, providing a potential entry point for cyber criminals. Therefore, every device our community uses to connect to any ²ÝÝ®ÎÛÊÓƵµ¼º½ system or resource carries the risk of becoming the chosen route for hacking into ²ÝÝ®ÎÛÊÓƵµ¼º½ and UofT. These devices can be exploited by malware that could leak or steal sensitive data. What can we collectively do?
²ÝÝ®ÎÛÊÓƵµ¼º½ 7, 2024

Password Security and Best Practices

Passwords act as a gateway to your online accounts and potentially your online identity, whether for academics, social networking, online banking, etc. As a result, they are highly coveted by malicious parties.