Open Government Portal

Found 10 records similar to Telework Security Issues (ITSAP.10.016)

Federal

Remote work introduces some challenges when trying to balance functionality with security. When working remotely, your employees need to access the same internal services, applications, and information that they would have access to in the office. However, your organization also needs to protect its systems and information, as remote work introduces new vulnerabilities. You need to implement additional security precautions to prevent threat actors from taking advantage of those vulnerabilities.

Last Updated: Nov. 2, 2022
Date Published: May 13, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Remote Access, Risk Management
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Nov. 2, 2022
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

As a business traveller, you should carefully consider the potential risks of using a mobile device during your travel. A compromised device has the potential to allow unauthorized access to your organization’s network, placing not only your own information at risk, but also that of the organization.

Last Updated: Nov. 2, 2022
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Mobility, Wireless, Travel, Voice and Telephony, Your Privacy Online
Federal

If you’re someone who is in a high-profile position, such as a politician or a senior executive, you need to protect the security of your mobile devices when you travel. Mobile devices contain sensitive information and they are high-value targets for cyber threat actors. If your device or the information on it is compromised, it could be used against you or the organization you represent. Below, we cover some of the common threats and the security measures you should take before, during, and after you travel to protect your mobile devices.

Last Updated: Nov. 2, 2022
Date Published: Sep. 9, 2021
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Mobility
Federal

"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that provide unique opportunities for threat actors intent on gathering information, because they can contain vast amounts of sensitive and personal information. A compromised device has the potential to allow unauthorized access to your departmental network, placing not only your own information at risk, but also that of the organization.

Last Updated: Nov. 2, 2022
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Wireless, Travel, Voice and Telephony
Federal

"Trying to use different and complex passwords for every website, account, and application can be challenging. If you are experiencing password overload, you may become careless. Maybe you keep all your passwords written down or reuse the same, easy to remember password. You can use a password manager to help you create, store, and remember your passwords.

Last Updated: Nov. 2, 2022
Date Published: Sep. 18, 2019
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Learning, Risk Management, Your Privacy Online
Federal

"

A compromise of your social media or email account has serious implications. If you think your email or social media accounts have been breached, you should follow the steps below and contact your IT security officer. Depending on the nature of the suspected compromise, your IT security officer could be with the HoC. It could also be your DSO or your political party CIO.

Last Updated: Nov. 2, 2022
Date Published: Aug. 13, 2019
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Learning, Your Privacy Online
Federal

You have passwords for everything: your devices, your accounts (e.g. banking, social media, and email), and the websites you visit. By using passphrases or strong passwords you can protect your devices and information. Review the tips below to learn how you can create passphrases, strengthen your passwords, and avoid common mistakes that could put your information at risk.

Last Updated: Nov. 2, 2022
Date Published: Sep. 18, 2019
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Learning, Mobility, Wireless, Risk Management, Your Privacy Online
Federal

Businesses or organizations anticipated to shrink office locations due to the workforce teleworking, by North American Industry Classification System (NAICS), business employment size, type of business, business activity and majority ownership, third quarter of 2021.

Last Updated: Oct. 28, 2021
Date Published: Aug. 27, 2021
Organization: Statistics Canada
Formats: XML CSV HTML
Keywords:  business dynamics, business performance and ownership, coronavirus, current business conditions, hours of work and work arrangements, labour, labour impacts of covid-19, society and community, table
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your organization must ensure that security risks are properly managed, cloud specific security considerations are addressed, and security controls of cloud-based services are properly assessed before authorized.

You organization can use the guidance in this document to assist with its security assessment and authorization of cloud-based services. "

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management
Date modified: