Cyber Security for Healthcare Organizations: Protecting Yourself Against Common Cyber Attacks (ITSAP.00.131)

Cyber Security for Healthcare Organizations: Protecting Yourself Against Common Cyber Attacks (ITSAP.00.131)

  As a healthcare organization, you work with highly sensitive information like personal health information (PHI), financial information, and research data, making you a high-value target for cyber threat actors. For example, PHI is more valuable on the black market than other types of personal information. It is used to create fake insurance claims, purchase […]

read more

Security Considerations for Research and Development (ITSAP.00.130)

GET STARTED WITH THESE CYBER SECURITY PRACTICES Cyber security might be a new priority for you, but there are actions you can take to reduce the risks associated with cyber threats and vulnerabilities. These actions are only a starting point. For more guidance, see our Baseline Cyber Security Controls for Small and Medium Organizations. TRAIN […]

read more

Virtualizing Your Infrastructure (ITSAP.70.011) – Canadian Centre for Cyber Security

Virtualization is a software-based technology used to create software versions of IT systems and services that are traditionally implemented in separate physical hardware. These software versions, or virtual instances, can dramatically increase efficiency and decrease costs; you can use hardware to its full capacity by distributing its capabilities among many different services. Before implementing virtualization […]

read more

How to use Online Banking Securely (ITSAP.00.080)

Online banking offers you the convenience of accessing your financial information through a mobile device or a computer. Although your online banking services should be secure (e.g. using authentication and encryption), there are risks related to the possibility that threat actors can find ways to access your sensitive information. This document includes some tips on […]

read more

How to Protect Your Organization From Malicious Macros (ITSAP.00.200)

Macros are written sequences that imitate user keystrokes and mouse commands to automatically repeat tasks in applications. Macros are used in many Office suite documents to automate processes and data flows. They are embedded in the code of the files, enabling users to create shortcuts for specific tasks (e.g. sort worksheets alphabetically, unmerge all merged […]

read more