-
Protecting Classified Information
o 5 Tips for Protecting Classified Information o Modernizing our Secret Infrastructure o Security Categorization for an Open Government o Go Ahead...This Line is Secure o... -
Top 10 IT security action items: No.2 patch operating systems and...
One of our top 10 recommended IT security actions is to patch operating systems and applications. This document outlines several best practices for patching. -
Cyber Mitigation: The Essential Steps
o Essential Mitigation o Application Whitelisting o Spear Phishing o Taking Care of Your Secure Communications Device o Using Portable Media o Mobile Device Management -
CCNSS Bulletin Edition 1 | March 2018
"In This Edition Recent Approval of Two New Standards Recent Discussion on CEO Material Future Meeting Agendas May and September Contact Us " -
Be Proactive: Prevent Malicious Attacks On Your Network
o Don’t Fall Victim to Ransomware: 5 Actions to Protect Your Network o Cyber Security Event Management Plan o Treasury Board Secretariat of Canada “Engarde” Exercise o How Are... -
Guidance on Cloud Security Assessment and Authorization (ITSP.50.105)
"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable and self-service IT services. To benefit from cloud computing, your... -
Open Government Implementation Plan - Communications Security Establishment - 2020-21
The Open Government Implementation Plan document describes the Communications Security Establishment's (CSE) planned activities and deliverables aligned based on the... -
Network Security: Protecting Our Information Assets
o Network Security Zones o Smart Computing Tips for Everyone o Securing WLANs o Risk Management for iPads o Common Challenges to Adopting a Risk Management Strategy o Minimizing... -
CCNSS Bulletin Edition 2 | June 2018
"In This Edition Recent Approval of Two New Standards Recent Discussion on Physical Security Future Meeting Agendas September and December Contact Us " -
The Changing Nature of How We Work
o Web 2.0 Security Risks o Data Diodes in a Cross-Domain Solution o The Importance of a Departmental TA o Two-Factor Authentication o Cloud Computing -
Building a Strong Foundation for the GC
o Social Media Security Pitfalls o Success of your Departmental Mission o Anatomy of a Cyber Intrusion o Securing BlackBerry Devices o Using Wi-Fi While Travelling -
Cyber Threats To Canada's Democratic Process
The recent cyber threat activity against the democratic process in the United States and Europe has raised concerns about similar threats to Canada. In this assessment, we... -
Top 10 IT security action items: No. 10 Implement application allow lists -...
This document outlines several best practices for controlling permitted applications on your systems. -
Guidance on Securely Configuring Network Protocols (ITSP.40.062)
The information in this publication identifies and describes acceptable security protocols and their appropriate methods of use to ensure continued protection of UNCLASSIFIED,... -
Keeping our Information Secure
o Instant Messaging Security Risks o Spotting Malicious Emails o GC CIRT Pointer: Exploit Kits o Securing your GC SECRET Network o Sharing Information across Different Security... -
IT Security: An Individual and Collective Responsibility
Risk Management Cyber Mitigation – Patching Best Practices – Passwords Securing WLANs Procuring Assured Products for Protected B Networks -
Collective Agreement for CSE (updated September 2023)
This dataset represents the collective agreement for Communications Security Establishment. -
Keeping Pace with Emerging Threats
o CSE’s Top 10 Security Actions o The Dangers of Free Dynamic DNS o Using a Blackberry as a Hotspot o Cyber Security Considerations for Management o Hardware Security Modules o... -
Guidance on Cloud Service Cryptography (ITSP.50.106)
"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this... -
Building a Resilient Network
o Interview: Why the Top 10? o Denial of Service o Mobility Security o Cyber Security Awareness Month o Zero-Day Exploits o Disposition of Windows XP o Cross Domain Solutions