Open Government Portal

Found 10 records similar to Video Teleconferencing (ITSAP.10.216)

Federal

"This cyber security playbook guides elections authorities on anticipating, mitigating, and responding to threats that are specific to Canada’s democratic processes. This playbook introduces baseline cyber security measures and best practices that you can implement to improve your organization’s security profile. This playbook also provides a set of standards to reference as elections authorities continue to improve current systems and implement new ones. The guidance in this document is based on information gathered from various sources and is only intended to provide a set of recommendations that you can implement in addition to your organizational policies and practices.

Last Updated: Dec. 23, 2020
Date Published: Aug. 26, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management, Top 10, elections
Federal

As a research organization, you rely on your ability to continuously innovate, develop, and improve. Your research data and intellectual property are high-value targets for cyber threat actors, and a successful cyber attack can prevent you from carrying out your work and jeopardize your data. To protect your research environment and data, your organization should understand common cyber security threats and implement some basic security measures.

Last Updated: Dec. 23, 2020
Date Published: Sep. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Identity and Passwords, Remote Access, Wireless, Network Security, Risk Management
Federal

This document is part of a suite of documents that focus on each of the top 10 IT security actions recommended in ITSM.10.189 Top 10 IT Security Actions to Protect Internet Connected Networks and Information [1]. While implementing all 10 of the recommended security actions can reduce your organization’s vulnerability to cyber threats, you should review your current cyber security activities to determine whether additional actions are required.

Last Updated: Dec. 23, 2020
Date Published: Feb. 20, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Learning, Risk Management, Top 10
Federal

This document focuses on the IT-related concerns regarding insider threats. An insider threat is anyone who has knowledge of or access to your organization’s infrastructure and information and who uses, either knowingly or inadvertently, the infrastructure or information to cause harm. Insider threats can put your organization’s employees, customers, assets, reputation, and interests at risk. However, there are security procedures you can implement to reduce the risks.

Last Updated: Dec. 23, 2020
Date Published: Feb. 12, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Learning, Mobility, Remote Access, Wireless, Network Security, Risk Management, Virus, Social Media
Federal

Having a backup (a copy) of your organization’s information is one step that you can take to improve your cyber security and your resiliency as a business. If your networks, systems, or information are compromised by a threat, such as a virus, or damaged due to a natural disaster, a backup helps your organization minimize downtime and get back to business quickly.

Last Updated: Dec. 23, 2020
Date Published: Oct. 1, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Network Security, Risk Management
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Dec. 23, 2020
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

Remote work introduces some challenges when trying to balance functionality with security. When working remotely, your employees need to access the same internal services, applications, and information that they would have access to in the office. However, your organization also needs to protect its systems and information, as remote work introduces new vulnerabilities. You need to implement additional security precautions to prevent threat actors from taking advantage of those vulnerabilities.

Last Updated: Dec. 23, 2020
Date Published: May 13, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Remote Access, Risk Management
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your organization must ensure that security risks are properly managed, cloud specific security considerations are addressed, and security controls of cloud-based services are properly assessed before authorized.

You organization can use the guidance in this document to assist with its security assessment and authorization of cloud-based services. "

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Network Security, Risk Management
Federal

Online shopping is convenient; you can purchase items through your mobile device and get next-day delivery to your front door. However, you should be aware of the threats associated with online shopping. These threats pose many risks to not only your personal information, but your organization’s assets (e.g. email address, shipping address, phone number, credit card).

Last Updated: Dec. 23, 2020
Date Published: Nov. 28, 2019
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Supply Chain Security, Your Privacy Online
Federal

When selecting an approach to deploy mobile devices in your organization, you can choose from different deployment models, each of which comes with its own benefits and risks. With mobile devices, managing risk depends partly on employee cooperation (i.e. willingness to allow use restrictions, monitoring, and security access by the organization) and partly on the inherent risks and vulnerabilities in the types of devices included. To select a deployment model that best balances these elements for your organization, consider user experience, privacy, and security requirements.

Last Updated: Dec. 23, 2020
Date Published: Jun. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Risk Management
Date modified: