Open Government Portal
Guidance on securing SIM cards to prevent unauthorized access, fraud, and cyber attacks targeting mobile devices.
This report is part of a series of cyber threat assessments focused on Canada’s critical infrastructure . It is intended …
On February 28, 2026, the United States (U.S.) and the State of Israel (Israel) launched military strikes against the Islamic …
Guidance on preventing ransomware attacks and recovering systems after an incident.
This guidance helps users identify phishing and malicious emails that aim to steal sensitive information or compromise systems.
Organizing and sharing information during a cyber incident involves a structured approach that ensures the effective communication of relevant details …
Strategies to strengthen an organization’s ability to withstand and recover from cyber emergencies.
Instructions for building a technical recovery plan to restore IT systems and data after an outage or cyber incident.
Cyber attacks are common and can impact organizations of all sizes, within all sectors. This publication provides guidance on the …
This guide explores the cyber security risks associated with using drones, including data breaches, unauthorized access, and operational disruptions.