Communications Security Establishment Canada

30 datasets found
  • Open Information

    Password Managers-Security (ITSAP.30.025)

    "Trying to use different and complex passwords for every website, account, and application can be challenging. If you are experiencing password overload, you may become careless. Maybe you keep all your passwords written down or reuse the same, easy to remember password. You can use a password...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Secure Your Accounts and Devices With Multi-Factor Authentication (ITSAP.30.030)

    Organizations and individuals can benefit from using multi-factor authentication (MFA) to secure devices and accounts. With MFA enabled, two or more different authentication factors are needed to unlock a device or sign in to an account. Whether accessing email, cloud storage, or online banking...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Security Tips for Organizations With Remote Workers (ITSAP.10.016)

    Remote work introduces some challenges when trying to balance functionality with security. When working remotely, your employees need to access the same internal services, applications, and information that they would have access to in the office. However, your organization also needs to protect...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Spotting Malicious Email Messages (ITSAP.00.100)

    Organizations and their networks are frequently targeted by a wide variety of threat actors looking to steal information. Cyber intruders are technologically savvy, vulnerability conscious, and aggressively agile; a successful intrusion can quickly lead to the loss of data integrity and...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Top 10 IT Security Actions to Protect Internet Connected Networks and Information (ITSM.10.189)

    The Top 10 Information Technology (IT) Security Actions to Protect Internet-Connected Networks and Information (ITSM.10.189) is based on the Canadian Centre for Cyber Security (CCCS) analysis of cyber threat activity trends and their impact on Internet-connected networks. Organizations that...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Using your mobile device securely (ITSAP.00.001)

    "Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Top 10 IT Security Actions: #6 Provide Tailored Cyber Security Training (ITSM.10.093)

    This document is part of a suite of documents that focus on each of the top 10 IT security actions recommended in ITSM.10.189 Top 10 IT Security Actions to Protect Internet Connected Networks and Information [1]. While implementing all 10 of the recommended security actions can reduce your...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Malicious Cyber Activity Targeting Information Technology Managed Service Providers

    The Canadian Centre for Cyber Security (Cyber Centre) is aware of the ongoing malicious cyber activity targeting information technology (IT) managed service providers (MSPs) and has been providing advice and guidance to Canada-based MSPs and Canadian businesses who use MSP services.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Guidance on Cloud Service Cryptography (ITSP.50.106)

    "Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this potential, it is imperative that we address the security and privacy dimensions of cloud computing. Cryptography is one of...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
    • PDF
  • Open Information

    Cloud Security Risk Management (ITSM.50.062)

    To enable the adoption of cloud computing, the Government of Canada (GC) developed an integrated risk management approach to establish cloud-based services. ITSM.50.062 outlines this approach which can be applied to all cloud based services independently of the cloud service and deployment models.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML