Open Government Portal
Open Data Search has recently undergone significant changes. The search page has moved to search.open.canada.ca/opendata. Please update existing bookmarks accordingly.
Found 10 records similar to IT Security: An Individual and Collective Responsibility
o Network Security Zones
o Smart Computing Tips for Everyone
o Securing WLANs
o Risk Management for iPads
o Common Challenges to Adopting a Risk Management Strategy
o Minimizing Administrative Privileges
o Java Mitigation Measures
o Top 10 For Everyone
o Put Your Money Where Your Data Is – Invest In Cyber Security
o CSE’s Assessment On Cyber Threats To Canada’s Democratic Process
o The Forecast On Cloud Computing
o Cyber Hygiene Series: Social Media
o CSE In The Community
o Don’t Fall Victim to Ransomware: 5 Actions to Protect Your Network
o Cyber Security Event Management Plan
o Treasury Board Secretariat of Canada “Engarde” Exercise
o How Are Your Cyber Hygiene Habits?
o Internet of Things – The Future is Now
o Canadian Medium Assurance Solutions
o Shared Services Canada’s Security Operations Centre
o CSE’s Top 10 and Shared Services Canada
o CSE’s Top 10 in the Mobile Environment
o The Canadian Centre for Cyber Security
o Meltdown and Spectre
o Trending Topic: Cloud Benefits
o COMSEC Update
o CSE in the Community: Hackergal
o ITSLC News
This fact sheet focuses on the protection of the Government of Canada's Information Technology infrastructure and how Budget 2016 resources enable Shared Services Canada to increase protection against cyber threats.
"The Canadian Centre for Cyber Security has warned that foreign actors will likely try to interfere in Canadian election processes. If you’re involved in politics – as a political candidate, staffer or volunteer – you are a target. It’s vital that you take steps to protect yourself. The Cyber Centre has advice to help you protect your cyber security and deal with threats to your social media accounts.
"Trying to use different and complex passwords for every website, account, and application can be challenging. If you are experiencing password overload, you may become careless. Maybe you keep all your passwords written down or reuse the same, easy to remember password. You can use a password manager to help you create, store, and remember your passwords.
o Instant Messaging Security Risks
o Spotting Malicious Emails
o GC CIRT Pointer: Exploit Kits
o Securing your GC SECRET Network
o Sharing Information across Different Security Domains
o VoIP for GC Departments
o TBS Corner: Web 2.0 and the GC
o Application-Based Firewalls
The recent cyber threat activity against the democratic process in the United States and Europe has raised concerns about similar threats to Canada. In this assessment, we consider the cyber threats to Canada’s democratic process at the federal, provincial/territorial, and municipal levels of government. We restrict our analysis of the democratic process to three important aspects that adversaries can target: elections, political parties and politicians, and the media. To better understand the threat environment, CSE examined cyber threat activity against democratic processes both in Canada and around the world over the past ten years.