Open Government Portal
Found 10 records similar to Common Employee IT Security Challenges (ITSAP.00.005)
"The Canadian Centre for Cyber Security has warned that foreign actors will likely try to interfere in Canadian election processes. If you’re involved in politics – as a political candidate, staffer or volunteer – you are a target. It’s vital that you take steps to protect yourself. The Cyber Centre has advice to help you protect your cyber security and deal with threats to your social media accounts.
"As an organization owner, have you ever paused to think about the kind of information you share with your supply chain? Do you know how suppliers are handling your and your client’s information or where this information is saved? It’s in your best interest to ask these and other questions to keep your organization secure. Like large organizations, small and medium-sized organizations are vulnerable to cyber attacks because they have a lot of sensitive information that attracts threat actors.
Online banking offers you the convenience of accessing your financial information through a mobile device or a computer. Although your online banking services should be secure (e.g. using authentication and encryption), there are risks related to the possibility that threat actors can find ways to access your sensitive information. This document includes some tips on how you can protect your sensitive financial information while using online banking services.
As a research organization, you rely on your ability to continuously innovate, develop, and improve. Your research data and intellectual property are high-value targets for cyber threat actors, and a successful cyber attack can prevent you from carrying out your work and jeopardize your data. To protect your research environment and data, your organization should understand common cyber security threats and implement some basic security measures.
Threat actors can use malware, or malicious software, to infiltrate or damage networks, systems, and devices. Once malware is installed on your organization’s systems and devices, threat actors can gain access to sensitive information. This document introduces some common types of malware, tips for detecting whether your devices have been infected, and steps to protect your organization from being compromised by malware.
Peripheral devices are devices that you connect to and use with a host computer or mobile device. You can use peripherals to enhance the capabilities of a computer or mobile device and improve your user experience. However, these devices can provide threat actors with another means to compromise your organization’s networks, systems, and information.
Social media gives you the power to connect with others effortlessly and share information instantly. Since these services and platforms have become so integrated and integral to daily online activities, many employers allow employees to use personal social media accounts at work. However, when you use personal social media at work, you can be providing threat actors easy and obvious entry points to your organization’s networks and information. You can even be placing your online identity and that of your co-workers at risk.
As a healthcare organization, you work with highly sensitive information like personal health information (PHI), financial information, and research data, making you a high-value target for cyber threat actors. For example, PHI is more valuable on the black market than other types of personal information. It is used to create fake insurance claims, purchase medical equipment, or fill prescriptions that can be used or sold. Cyber security might be a new priority for you, but you don’t have to be an IT expert to protect yourself from cyber threat actors.
"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that provide unique opportunities for threat actors intent on gathering information, because they can contain vast amounts of sensitive and personal information. A compromised device has the potential to allow unauthorized access to your departmental network, placing not only your own information at risk, but also that of the organization.
This guide is for parents. It contains helpful information about parenting after separation and divorce. You can use this guide if you’re making a parenting arrangement under the Divorce Act. This guide may still be useful to you even if the Divorce Act doesn’t apply to your situation.