Open Government Portal

Found 10 records similar to Mobile Devices and Business Travellers (ITSAP.00.087)

Federal

"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations and agencies, their use can also pose a threat to information and networks. Mobile devices are attractive targets that provide unique opportunities for threat actors intent on gathering information, because they can contain vast amounts of sensitive and personal information. A compromised device has the potential to allow unauthorized access to your departmental network, placing not only your own information at risk, but also that of the organization.

Last Updated: Nov. 2, 2022
Date Published: Oct. 1, 2018
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Wireless, Travel, Voice and Telephony
Federal

If you’re someone who is in a high-profile position, such as a politician or a senior executive, you need to protect the security of your mobile devices when you travel. Mobile devices contain sensitive information and they are high-value targets for cyber threat actors. If your device or the information on it is compromised, it could be used against you or the organization you represent. Below, we cover some of the common threats and the security measures you should take before, during, and after you travel to protect your mobile devices.

Last Updated: Nov. 2, 2022
Date Published: Sep. 9, 2021
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Mobility
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Nov. 2, 2022
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

Help keep your devices and your data safe from potential intruders.

Last Updated: Nov. 2, 2022
Date Published: Apr. 13, 2022
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  WI-FI, Network, Secure
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your organization must ensure that security risks are properly managed, cloud specific security considerations are addressed, and security controls of cloud-based services are properly assessed before authorized.

You organization can use the guidance in this document to assist with its security assessment and authorization of cloud-based services. "

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management
Federal

You have passwords for everything: your devices, your accounts (e.g. banking, social media, and email), and the websites you visit. By using passphrases or strong passwords you can protect your devices and information. Review the tips below to learn how you can create passphrases, strengthen your passwords, and avoid common mistakes that could put your information at risk.

Last Updated: Nov. 2, 2022
Date Published: Sep. 18, 2019
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Identity and Passwords, Learning, Mobility, Wireless, Risk Management, Your Privacy Online
Federal

o Social Media Security Pitfalls
o Success of your Departmental Mission
o Anatomy of a Cyber Intrusion
o Securing BlackBerry Devices
o Using Wi-Fi While Travelling

Last Updated: Nov. 1, 2018
Date Published: Sep. 1, 2013
Organization: Communications Security Establishment Canada
Formats: PDF
Keywords:  Cyber Security, Cyber Threats
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this potential, it is imperative that we address the security and privacy dimensions of cloud computing. Cryptography is one of the main pillars enabling security and privacy in cloud computing. It plays an essential role in enabling cloud services such as authentication, secure access to cloud workloads, secure data storage, and secure data exchange.

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cryptography, Cyber Defence, Network Security, Risk Management
Federal

Learn how to keep your device — and your data — safe.

Last Updated: Nov. 2, 2022
Date Published: Apr. 13, 2022
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Phone, Tablets
Federal

The Internet of Things (IoT) refers to the network of everyday web-enabled objects that can connect and exchange information. These “smart” objects include more than your computer, smartphone, or tablet. They include items like personal fitness trackers, TVs, thermostats, or cars. This list of IoT devices is continuing to grow.

Last Updated: Nov. 2, 2022
Date Published: Sep. 23, 2019
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Cyber Defence, Learning, Risk Management
Date modified: