Cyber Security Considerations For Consumers of Managed Services (ITSM.50.030)

Cyber Security Considerations For Consumers of Managed Services (ITSM.50.030)

  Foreword This document is an UNCLASSIFIED publication that has been issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, email or phone our Contact Centre: Contact [email protected](613) 949-7048 or 1-833-CYBER-88 EFFECTIVE DATE This publication takes effect on October 14, 2020. REVISION HISTORY Revision Amendments […]

read more

How is Your Smart Device Listening to you? (ITSAP.70.013)

Smart devices have become increasingly popular at work and at home. They can connect to other devices, creating a network called the Internet of Things (IoT). Certain devices can control all the other smart devices in the IoT by using voice command services. These devices are called digital assistants. Digital assistants connect to other devices […]

read more

Common Employee IT Security Challenges (ITSAP.00.005)

INFORMATION TECHNOLOGY SECURITY IS EVERYONE’S RESPONSIBILITY As an employee, you’re not only privy to your organization’s important and sensitive information, but you’re also responsible for protecting this information. Inadequate security practices provide cyber threat actors with an easy way to bring down your organization’s network and access your sensitive information. To prevent cyber attacks, there […]

read more

Offer Tailored Cyber Security Training to Your Employees (ITSAP.10.093)

One of the Cyber Centre’s top 10 IT security actions is to provide cyber security training that is tailored to your organization’s specific business needs and security requirements. By providing tailored training to all personnel (i.e. employees, contractors, managers, and executives), you can increase awareness of cyber security issues that your organization faces. When all […]

read more

Protecting Your Organization While Using WI-FI (ITSAP.80.009)

Wi-Fi is often an essential technology to support your business functions. However, Wi-Fi can also expose your organization to vulnerabilities that can be exploited by threat actors. To stay safe while staying connected, you should ensure that you have security measures in place to protect your networks, systems, and information. WHAT IS WI-FI? Wi-Fi is […]

read more

Guidance on Securely Configuring Network Protocols (ITSP.40.062)

  Foreword This document, ITSP.40.062 Guidance on Securely Configuring Network Protocols, is an UNCLASSIFIED publication issued by the Canadian Centre for Cyber Security (Cyber Centre) and provides an update to the previously published version. We recommend that you also read ITSP.40.111 Cryptographic Algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B Information. The configurations in this […]

read more

Security Tips for Peripheral Devices (ITSAP.70.015)

HOW CAN I USE PERIPHERALS SECURELY? ASSESS PERIPHERALS Your supply chain can impact your security. When purchasing peripherals, be sure to choose a reputable vendor that offers peripherals with security integrated. Use caution when gifted peripherals from unknown parties (e.g. a vendor at a conference). These free peripherals may contain malware that is designed to […]

read more

Sanitization and Disposal of Electronic Devices (ITSAP.40.006)

Many of the electronic devices we use today store personal or sensitive information. When our devices (e.g. tablets, smartphones, or computers) become surplus to our needs, we look for ways to dispose of them (e.g. donate, recycle, or resell). However, your unwanted equipment may still contain personal or sensitive information. Before you get rid of […]

read more

Cyber Security at Home and in The Office: Secure Your Devices, Computers, and Networks (ITSAP.00.007)

With remote work becoming increasingly popular, we rely on numerous devices and our ability to connect to the Internet for work and personal reasons. However, cyber threat actors take advantage of our reliance on technology. Protect yourself by taking stock of all the technology you use, including your mobile and smart devices, computers, and Wi‑Fi […]

read more

Tips for Backing up Your Information (ITSAP.40.002)

Having a backup (a copy) of your organization’s information is one step that you can take to improve your cyber security and your resiliency as a business. If your networks, systems, or information are compromised by a threat, such as a virus, or damaged due to a natural disaster, a backup helps your organization minimize […]

read more