Open Government Portal

Found 10 records similar to Supply chain security for small and medium-sized organizations (ITSAP.00.070)

Federal

As a research organization, you rely on your ability to continuously innovate, develop, and improve. Your research data and intellectual property are high-value targets for cyber threat actors, and a successful cyber attack can prevent you from carrying out your work and jeopardize your data. To protect your research environment and data, your organization should understand common cyber security threats and implement some basic security measures.

Last Updated: Dec. 23, 2020
Date Published: Sep. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Identity and Passwords, Remote Access, Wireless, Network Security, Risk Management
Federal

By using video-teleconferencing (VTC) applications, your organization can meet and work with employees, clients, and partners who are in different geographic locations. However, there are security and privacy risks that you should consider before selecting and implementing VTC applications in your organization. Identifying the threats and risks related to these tools ensures that you implement the appropriate security measures and best practices to protect your organization’s virtual work environment.

Last Updated: Dec. 23, 2020
Date Published: May 12, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Remote Access, Risk Management, Your Privacy Online
Federal

Small and medium organizations have valuable information (e.g. sensitive business, employee, and client information) that needs to be protected to ensure business activities run smoothly. Small and medium organizations are likely targets of cyber attacks because these organizations often lack resources to put towards cyber security. While it may not be possible to protect everything, knowing what information is valuable to your organization can help you protect what matters most.

Last Updated: Dec. 12, 2019
Date Published: Apr. 30, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Risk Management, Your Privacy Online
Federal

Having a backup (a copy) of your organization’s information is one step that you can take to improve your cyber security and your resiliency as a business. If your networks, systems, or information are compromised by a threat, such as a virus, or damaged due to a natural disaster, a backup helps your organization minimize downtime and get back to business quickly.

Last Updated: Dec. 23, 2020
Date Published: Oct. 1, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Risk Management
Federal

As an employee, you’re not only privy to important and sensitive information, but you’re also responsible for protecting this information. Inadequate information technology security (ITS) practices provide cyber threat actors with an easy way to bring down your organization’s network and give them access to sensitive information. To keep threat actors out, there are some common IT security challenges you can avoid.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Wireless, Voice and Telephony, Your Privacy Online, Social Media
Federal

"This cyber security playbook guides elections authorities on anticipating, mitigating, and responding to threats that are specific to Canada’s democratic processes. This playbook introduces baseline cyber security measures and best practices that you can implement to improve your organization’s security profile. This playbook also provides a set of standards to reference as elections authorities continue to improve current systems and implement new ones. The guidance in this document is based on information gathered from various sources and is only intended to provide a set of recommendations that you can implement in addition to your organizational policies and practices.

Last Updated: Dec. 23, 2020
Date Published: Aug. 26, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management, Top 10, elections
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Dec. 23, 2020
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

Online shopping is convenient; you can purchase items through your mobile device and get next-day delivery to your front door. However, you should be aware of the threats associated with online shopping. These threats pose many risks to not only your personal information, but your organization’s assets (e.g. email address, shipping address, phone number, credit card).

Last Updated: Dec. 23, 2020
Date Published: Nov. 28, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Supply Chain Security, Your Privacy Online
Federal

This document is part of a suite of documents that focus on each of the top 10 IT security actions recommended in ITSM.10.189 Top 10 IT Security Actions to Protect Internet Connected Networks and Information [1]. While implementing all 10 of the recommended security actions can reduce your organization’s vulnerability to cyber threats, you should review your current cyber security activities to determine whether additional actions are required.

Last Updated: Dec. 23, 2020
Date Published: Feb. 20, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Learning, Risk Management, Top 10
Federal

As a business traveller, you should carefully consider the potential risks of using a mobile device during your travel. A compromised device has the potential to allow unauthorized access to your organization’s network, placing not only your own information at risk, but also that of the organization.

Last Updated: Dec. 12, 2019
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Wireless, Travel, Voice and Telephony, Your Privacy Online
Date modified: