Open Government Portal

Found 10 records similar to Secure Your Accounts and Devices With Multi-Factor Authentication (ITSAP.30.030)

Federal

Multi-factor authentication (MFA) adds an extra step to the login process and an extra layer of security to your accounts and devices.

Last Updated: Apr. 13, 2022
Date Published: Apr. 13, 2022
Organization: Communications Security Establishment Canada
Formats: HTML
Keywords:  Multi-factor authentication (MFA), Security
Federal

Biometrics refers to the measurement and use of your unique body characteristics (e.g. fingerprints, retinas, facial structure, speech, or vein patterns). For example, you can use your fingerprint as a form of authentication to unlock your mobile device. If using your biometrics for authentication, we recommend using them with a password or PIN for an added layer of protection (i.e.

Last Updated: Dec. 23, 2020
Date Published: Feb. 27, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Identity and Passwords, Mobility, Risk Management
Federal

Online banking offers you the convenience of accessing your financial information through a mobile device or a computer. Although your online banking services should be secure (e.g. using authentication and encryption), there are risks related to the possibility that threat actors can find ways to access your sensitive information. This document includes some tips on how you can protect your sensitive financial information while using online banking services.

Last Updated: Dec. 23, 2020
Date Published: Sep. 10, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Identity and Passwords, Risk Management, Your Privacy Online
Federal

"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this potential, it is imperative that we address the security and privacy dimensions of cloud computing. Cryptography is one of the main pillars enabling security and privacy in cloud computing. It plays an essential role in enabling cloud services such as authentication, secure access to cloud workloads, secure data storage, and secure data exchange.

Last Updated: Dec. 23, 2020
Date Published: Jun. 3, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Cryptography, Cyber Defence, Network Security, Risk Management
Federal

You have online accounts for everything ranging from government services to online shopping. Each time you create a new account, you need to create a username and a password. Reusing these credentials (i.e. your username or email address and password) for multiple accounts might be convenient, but you are actually making it easier for hackers to gain access to your accounts and your personal information.

Last Updated: Dec. 23, 2020
Date Published: Aug. 21, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Identity and Passwords, Mobility, Risk Management, Your Privacy Online
Federal

When selecting an approach to deploy mobile devices in your organization, you can choose from different deployment models, each of which comes with its own benefits and risks. With mobile devices, managing risk depends partly on employee cooperation (i.e. willingness to allow use restrictions, monitoring, and security access by the organization) and partly on the inherent risks and vulnerabilities in the types of devices included. To select a deployment model that best balances these elements for your organization, consider user experience, privacy, and security requirements.

Last Updated: Dec. 23, 2020
Date Published: Jun. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cyber Defence, Mobility, Risk Management
Federal

With remote work becoming increasingly popular, we rely on numerous devices and our ability to connect to the Internet for work and personal reasons. However, cyber threat actors take advantage of our reliance on technology. Protect yourself by taking stock of all the technology you use, including your mobile and smart devices, computers, and Wi‑Fi networks. By knowing what you have, you can prioritize your security efforts and put the right safeguards in place.

Last Updated: Dec. 23, 2020
Date Published: Oct. 1, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Cloud Security, Identity and Passwords, Mobility, Network Security, Risk Management
Federal

When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization’s security efforts and put you at risk if you don’t take precautions. Read through our cyber security tips to ensure that you are practicing good cyber hygiene when working from home, a café, or any other public location.

Last Updated: Dec. 23, 2020
Date Published: Apr. 17, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Remote Access, Network Security, Risk Management
Federal

Peripheral devices are devices that you connect to and use with a host computer or mobile device. You can use peripherals to enhance the capabilities of a computer or mobile device and improve your user experience. However, these devices can provide threat actors with another means to compromise your organization’s networks, systems, and information.

Last Updated: Dec. 23, 2020
Date Published: Oct. 13, 2020
Organization: Communications Security Establishment Canada
Formats: PDF HTML
Keywords:  Mobility, Wireless
Federal

External Credential Management is a cyber authentication service provided by the Government of Canada to allow the public and businesses to securely conduct online business with various governmental programs and services. Use of this service is mandatory for Government of Canada departments and agencies. The two services provided are GCKey and SecureKey. The GCKey service is provided by the Government of Canada to allow users to securely conduct online business with various governmental programs and services.

Last Updated: May 6, 2022
Date Published: Jan. 23, 2020
Organization: Shared Services Canada
Formats: CSV
Keywords:  External Credential Management, GCKey, SecureKey Concierge
Date modified: