Search Records

32 datasets found
  • Open Information

    Loss of control of social media channels

    The results of an account compromise can be devastating. If one of your social media accounts are compromised, do the following things: take action, assess and contain, and protect.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Identify and handle malicious messages

    All members of a campaign team should know how to identify malicious messages and how to handle them.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber Security Advice for Political Candidates

    "The Canadian Centre for Cyber Security has warned that foreign actors will likely try to interfere in Canadian election processes. If you’re involved in politics – as a political candidate, staffer or volunteer – you are a target. It’s vital that you take steps to protect yourself. The Cyber...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Protect how you connect

    Assessing possible risk before using social media platforms and apps
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    An Introduction to the Cyber Threat Environment

    This document describes common concepts relevant to discussions about cyber threat activity in the Canadian context and acts as a point of reference for Canadian Centre for Cyber Security (Cyber Centre) publications. This introductory document provides baseline knowledge about the cyber threat...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Continuing to Advance Our IT Security Goals

    o Canadian Medium Assurance Solutions o Shared Services Canada’s Security Operations Centre o CSE’s Top 10 and Shared Services Canada o CSE’s Top 10 in the Mobile Environment
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Building a Strong Foundation for the GC

    o Social Media Security Pitfalls o Success of your Departmental Mission o Anatomy of a Cyber Intrusion o Securing BlackBerry Devices o Using Wi-Fi While Travelling
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Building a Resilient Network

    o Interview: Why the Top 10? o Denial of Service o Mobility Security o Cyber Security Awareness Month o Zero-Day Exploits o Disposition of Windows XP o Cross Domain Solutions
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    The Changing Nature of How We Work

    o Web 2.0 Security Risks o Data Diodes in a Cross-Domain Solution o The Importance of a Departmental TA o Two-Factor Authentication o Cloud Computing
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
  • Open Information

    Keeping our Information Secure

    o Instant Messaging Security Risks o Spotting Malicious Emails o GC CIRT Pointer: Exploit Kits o Securing your GC SECRET Network o Sharing Information across Different Security Domains o VoIP for GC Departments o TBS Corner: Web 2.0 and the GC o...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • PDF
You can also access this registry using the API (see API Docs).