Open Government Portal

Found 10 records similar to Virtual Private Networks (ITSAP.80.101)

Federal

Telework is a flexible and convenient work arrangement that allows you to work outside of the traditional office environment. By remotely connecting to your organization’s network, you can continue to use applications and access information as though you were in the office.

Last Updated: Dec. 12, 2019
Date Published: Mar. 29, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility, Remote Access, Travel, Your Privacy Online
Federal

As an employee, you’re not only privy to important and sensitive information, but you’re also responsible for protecting this information. Inadequate information technology security (ITS) practices provide cyber threat actors with an easy way to bring down your organization’s network and give them access to sensitive information. To keep threat actors out, there are some common IT security challenges you can avoid.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Wireless, Voice and Telephony, Your Privacy Online, Social Media
Federal

Having a backup (a copy) of your organization’s information is one step that you can take to improve your cyber security and your resiliency as a business. If your networks, systems, or information are compromised by a threat, such as a virus, or damaged due to a natural disaster, a backup helps your organization minimize downtime and get back to business quickly.

Last Updated: Dec. 23, 2020
Date Published: Oct. 1, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Risk Management
Federal

"The iPad’s ease of use, short boot up time and portability makes the device more convenient than traditional laptops. Employees consider the iPad to be a great companion device, and are using it to replace paper, to take notes in meetings, and to read documents while travelling. However, iPads will introduce new risks to an organization’s business and the security of its information. The security risks are numerous, and must be carefully considered, clearly understood and security controls and safeguards put in place before iPads are allowed to remotely access a departmental network.

Last Updated: Dec. 12, 2019
Date Published: Jul. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Risk Management
Federal

This document is part of a suite of documents that focus on each of the top 10 IT security actions recommended in ITSM.10.189 Top 10 IT Security Actions to Protect Internet Connected Networks and Information [1]. While implementing all 10 of the recommended security actions can reduce your organization’s vulnerability to cyber threats, you should review your current cyber security activities to determine whether additional actions are required.

Last Updated: Dec. 23, 2020
Date Published: Feb. 20, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Learning, Risk Management, Top 10
Federal

As a business traveller, you should carefully consider the potential risks of using a mobile device during your travel. A compromised device has the potential to allow unauthorized access to your organization’s network, placing not only your own information at risk, but also that of the organization.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Wireless, Travel, Voice and Telephony, Your Privacy Online
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Dec. 23, 2020
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

"As an organization owner, have you ever paused to think about the kind of information you share with your supply chain? Do you know how suppliers are handling your and your client’s information or where this information is saved? It’s in your best interest to ask these and other questions to keep your organization secure. Like large organizations, small and medium-sized organizations are vulnerable to cyber attacks because they have a lot of sensitive information that attracts threat actors.

Last Updated: Dec. 12, 2019
Date Published: Mar. 29, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Securité de la chaîne d'approvisionnement
Federal

"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that provide unique opportunities for threat actors intent on gathering information, because they can contain vast amounts of sensitive and personal information. A compromised device has the potential to allow unauthorized access to your departmental network, placing not only your own information at risk, but also that of the organization.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Wireless, Travel, Voice and Telephony
Federal

Social media gives you the power to connect with others effortlessly and share information instantly. Since these services and platforms have become so integrated and integral to daily online activities, many employers allow employees to use personal social media accounts at work. However, when you use personal social media at work, you can be providing threat actors easy and obvious entry points to your organization’s networks and information. You can even be placing your online identity and that of your co-workers at risk.

Last Updated: Dec. 12, 2019
Date Published: Mar. 29, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Identity and Passwords, Your Privacy Online, Social Media
Date modified: