-
Using your mobile device securely (ITSAP.00.001)
"Your mobile device provides a convenient and flexible way to work anywhere or at anytime. While mobile devices play a vital role in the day-to-day operations of organizations... -
Password Managers-Security (ITSAP.30.025)
"Trying to use different and complex passwords for every website, account, and application can be challenging. If you are experiencing password overload, you may become... -
Three common types of phishing scams - Get Cyber Safe 2021
Be aware of the common types of phishing scams that are out there. -
Cyber Security Readiness Goals: Securing Our Most Critical Systems
Cyber security guidance -
Protecting high-value information: Tips for small and medium organizations...
Cyber security guidance -
Recommended cyber security contract clauses for cloud services (ITSM.50.104)
Cyber security guidance -
Top 10 IT security actions: Number 4 harden operating systems and...
Cyber security guidance -
Calculating Robustness for Boundary Controls (ITSP.80.032)
Calculating Robustness for Boundary Controls is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security Establishment (CSE). Suggestions... -
Using security information and event management tools to manage cyber...
Cyber security guidance -
Mobile Device Management (MDM) Solutions - Guidance for the Government of...
Mobile devices have spread rapidly across the Government of Canada (GC) corporate enterprise and while they boost productivity and efficiency, they significantly increase the... -
Baseline cyber threat assessment: Cybercrime
Cyber security guidance -
Cyber security considerations for drone use (ITSAP.00.143)
This guide explores the cyber security risks associated with using drones, including data breaches, unauthorized access, and operational disruptions. -
CSE Workforce Representation as of June 30th, 2022
This dataset represents the employment equity for the Communications Security Establishment. -
Mobile device guidance for high profile travellers (ITSAP.00.088)
Cyber security guidance -
Five practical ways to protect your campaign
As a kickstart to your cyber security planning, here are five practical measures you can take right now to make your campaign more secure. Visit www.cyber.gc.ca for more on any... -
The cyber threat to marine transportation
This report is part of a series of cyber threat assessments focused on Canada’s critical infrastructure . It is intended for leaders in the marine transportation sector, cyber... -
Cyber Security Best Practices: Contracting With Managed Service Providers
The purpose of this Information Note is to provide best practices and highlight security considerations when subscribing to services offered by managed service providers. -
Cyber security tips for remote work - ITSAP.10.116
Cyber security guidance -
Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B...
Cyber security guidance -
Parliamentarians: Report social media account impersonation
Cyber security guidance