Published 05/18/2026
Purpose: This document provides a summary of the Instructure (Canvas) security incident, answers to common questions, and guidance for best practices.
On this page:
- Incident Summary
- Official Updates (Instructure)
- What Happened
- Data Potentially Impacted
- What Was Not Impacted
- Vendor Actions (Instructure)
- Our Response and Current Status
- Recommended Actions for You
Incident Summary
Instructure, the owner and provider of our Canvas learning platform, recently experienced a cybersecurity incident affecting their systems. In response, they initiated a temporary service outage as part of their containment and recovery process. Canvas service has since been restored, and TMU continues to monitor the situation and evaluate vendor-provided updates related to our community’s data.
Official Updates (Instructure)
What Happened
Following a security event within Instructure’s environment, the Canvas platform underwent a temporary outage as part of their defense and recovery process. Once service was brought back online, TMU implemented security measures and validated the environment before re-establishing access for the campus. We are continuing to review verified updates as they are released by the vendor.
Data Potentially Impacted
Based on the information provided by Instructure to date, certain types of account information may have been impacted by this breach. These categories potentially include:
- Account names
- Account email addresses
- Student ID numbers
- User messages (e.g., Canvas inbox communications)
What Was Not Impacted
NOTICE: TMU account passwords were not impacted. TMU does not store passwords within Canvas, and no credential exposure has been reported by Instructure.
Canvas does not store certain categories of sensitive information, including:
- Passwords
- Social Security numbers
- Financial information
Vendor Actions (Instructure)
Instructure has stated they have taken a number of steps in response to this incident, including:
- Engaging third-party forensic experts
- Notifying law enforcement
- Enhancing monitoring and security controls across the platform
- Reporting that the unauthorized actor involved has been addressed through vendor-led response actions and that additional protective steps have been implemented
Our Response and Current Status
Recommended Actions for You
We ask all students, faculty, and staff to continue using the following best practices:
- Official Logins Only: Only log in to Canvas via the official URL: masters.instructure.com.
- Use Institutional Email: Always use your official @masters.edu email address for Canvas access.
- Practice Password Safety: Ensure you are not reusing the same password across multiple websites.
- Be Vigilant: If you receive a message about this incident and are unsure if it is legitimate, do not click any links or reply. Instead, report it using the Phish Alert Button in Outlook, or forward it to spam@masters.edu.
General Email Safety Reminder
Security events are often followed by an increase in phishing attempts. Use caution if you receive a message that:
- Uses Pressure or Urgency: Watch for subjects like “Action Required” or threats to lock your account.
- Requests Sensitive Info: TMU will never ask for your password or MFA codes via email.
- Includes Unexpected Links/Files: Avoid opening any attachment or link you weren’t expecting, even if it looks like it’s from a familiar source.
- Requests payment: TMU will never ask students, faculty, or staff to pay to access Canvas or to complete coursework or exams in Canvas.
- Reporting: If you see something suspicious, please use the Phish Alert Button or forward the email to spam@masters.edu.
