Open Government Portal

Found 1334 records

Exponential growth in the use of Internet-based technologies to deliver modern business services and applications is linked to the depletion …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: IPv6 security Network risks Protocol safeguards

This publication provides details on observed AitM phishing campaigns to highlight their prevalence and demonstrate the risk of leaving cloud …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Phishing-resistant MFA MitM defense Identity protection

Protecting Specified Information is of paramount importance to Government of Canada (GC) departments and agencies and can directly impact the …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Information protection External systems Compliance requirements

Cloud computing is the on-demand delivery of IT resources over the Internet. Think of it as a network of companies …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Cloud basics Virtual services On-demand computing

In our interconnected digital world, the security of data stored in the cloud is more critical than ever. Data spillage, …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Data spillage Cloud response Incident handling

In today's digital landscape, it is vital for your organization to protect sensitive data. Although email is a fundamental means …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Email threats Protection measures Secure messaging

This publication introduces several email configuration concepts, focusing on the available email authentication methods to verify the authenticity of the …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Email setup Configuration steps User guidance

Whether you lead a small or medium business or are an employee, email configuration is a key component to ensuring …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Email security Threat prevention Safe communication

Universal plug and play (UPnP) is a protocol that allows devices on the same network to automatically discover, connect to …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: UPnP Device connectivity Network protocols

Virtualization is a method of hardware abstraction that allows the creation of software versions of IT systems and services which …

Record Modified: Dec 5, 2025
Record Released: Dec 5, 2025
Publisher: Communications Security Establishment Canada
Formats: HTML
Keywords: Virtualization Infrastructure Resource optimization