Open Government Portal

Found 10 records similar to New - Using bluetooth Technology (ITSAP.00.011)

Federal

Peripheral devices are devices that you connect to and use with a host computer or mobile device. You can use peripherals to enhance the capabilities of a computer or mobile device and improve your user experience. However, these devices can provide threat actors with another means to compromise your organization’s networks, systems, and information.

Last Updated: Dec. 23, 2020
Date Published: Oct. 13, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility, Wireless
Federal

As a business traveller, you should carefully consider the potential risks of using a mobile device during your travel. A compromised device has the potential to allow unauthorized access to your organization’s network, placing not only your own information at risk, but also that of the organization.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Wireless, Travel, Voice and Telephony, Your Privacy Online
Federal

Learn how to keep your device — and your data — safe.

Last Updated: Apr. 13, 2022
Date Published: Apr. 13, 2022
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Phone, Tablets
Federal

Help keep your devices and your data safe from potential intruders.

Last Updated: Apr. 13, 2022
Date Published: Apr. 13, 2022
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  WI-FI, Network, Secure
Federal

You have passwords for everything: your devices, your accounts (e.g. banking, social media, and email), and the websites you visit. By using passphrases or strong passwords you can protect your devices and information. Review the tips below to learn how you can create passphrases, strengthen your passwords, and avoid common mistakes that could put your information at risk.

Last Updated: Dec. 12, 2019
Date Published: Sep. 18, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Learning, Mobility, Wireless, Risk Management, Your Privacy Online
Federal

Threat actors can use malware, or malicious software, to infiltrate or damage networks, systems, and devices. Once malware is installed on your organization’s systems and devices, threat actors can gain access to sensitive information. This document introduces some common types of malware, tips for detecting whether your devices have been infected, and steps to protect your organization from being compromised by malware.

Last Updated: Dec. 23, 2020
Date Published: Jan. 10, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Learning, Mobility, Remote Access, Wireless, Network Security, Risk Management, Virus, Your Privacy Online
Federal

Maybe you try opening files, only to be denied access. Perhaps your device is running slower. Maybe you notice other abnormal behaviour from your computer or device. There could be perfectly reasonable explanations for these issues, like you’re using old hardware, you don’t have enough RAM, or your disk is full.

Last Updated: Dec. 23, 2020
Date Published: Jun. 23, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Network Security, Virus, Your Privacy Online
Federal

"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that provide unique opportunities for threat actors intent on gathering information, because they can contain vast amounts of sensitive and personal information. A compromised device has the potential to allow unauthorized access to your departmental network, placing not only your own information at risk, but also that of the organization.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Wireless, Travel, Voice and Telephony
Federal

o Essential Mitigation
o Application Whitelisting
o Spear Phishing
o Taking Care of Your Secure Communications Device
o Using Portable Media
o Mobile Device Management

Last Updated: Nov. 1, 2018
Date Published: Mar. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF
Keywords:  Cyber Security, Cyber Threats
Federal

When selecting an approach to deploy mobile devices in your organization, you can choose from different deployment models, each of which comes with its own benefits and risks. With mobile devices, managing risk depends partly on employee cooperation (i.e. willingness to allow use restrictions, monitoring, and security access by the organization) and partly on the inherent risks and vulnerabilities in the types of devices included. To select a deployment model that best balances these elements for your organization, consider user experience, privacy, and security requirements.

Last Updated: Dec. 23, 2020
Date Published: Jun. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Risk Management
Date modified: