-
Catalogue Entry: Cloud Service Provider Information Technology Security Assessment Process...
The purpose of this document is to describe CCCS’s Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Program. The objective of the CSP ITS Assessment...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Cloud Security Risk Management (ITSM.50.062)
To enable the adoption of cloud computing, the Government of Canada (GC) developed an integrated risk management approach to establish cloud-based services. ITSM.50.062 outlines...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Guidance on the Security Categorization of Cloud-Based Services (ITSP.50.103)
This document is part of a suite of documents that the Cyber Centre has developed to help secure cloud-based services. Security categorization, the selection of a security...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Guidance on Cloud Service Cryptography (ITSP.50.106)
"Cloud computing has the potential to provide your organization with flexible, on-demand, scalable, and self-service information technology (IT) provisioning. To deliver this... -
Catalogue Entry: Malicious Cyber Activity Targeting Information Technology Managed Service Providers
The Canadian Centre for Cyber Security (Cyber Centre) is aware of the ongoing malicious cyber activity targeting information technology (IT) managed service providers (MSPs) and...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: ITSP.50.104 Guidance on Defence in Depth for Cloud-Based Services
This document is part of a suite of documents developed by the Cyber Centre to help secure cloud-based services and supports the cloud security risk management approach defined...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Top 10 IT Security Actions: #6 Provide Tailored Cyber Security Training (ITSM.10.093)
This document is part of a suite of documents that focus on each of the top 10 IT security actions recommended in ITSM.10.189 Top 10 IT Security Actions to Protect Internet...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Top 10 IT Security Actions to Protect Internet Connected Networks and...
The Top 10 Information Technology (IT) Security Actions to Protect Internet-Connected Networks and Information (ITSM.10.189) is based on the Canadian Centre for Cyber Security...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Security Tips for Organizations With Remote Workers (ITSAP.10.016)
Remote work introduces some challenges when trying to balance functionality with security. When working remotely, your employees need to access the same internal services,...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Password Managers-Security (ITSAP.30.025)
"Trying to use different and complex passwords for every website, account, and application can be challenging. If you are experiencing password overload, you may become...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Don't Take the Bait: Recognize and Avoid Phishing Attacks
Phishing is an attack where a scammer calls you, texts or emails you, or uses social media to trick you into clicking a malicious link, downloading malware, or sharing sensitive...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Cyber Centre Data Centre Virtualization Report: Best Practices for Data...
A VDC must address the threats, inherent vulnerabilities, and characteristic risks to data centres, as well as those specific to complex virtualized environments. Fortunately,...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Best Practices for Passphrases and Passwords (ITSAP.30.032)
You have passwords for everything: your devices, your accounts (e.g. banking, social media, and email), and the websites you visit. By using passphrases or strong passwords you...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Resources - Get Cyber Safe 2021
Get the latest videos, info-graphics and shareable content to help you stay cyber safe.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Three common types of phishing scams - Get Cyber Safe 2021
Be aware of the common types of phishing scams that are out there.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Implementation Guidance: Email Domain Protection
This document provides guidance to system owners on implementing technical security measures to protect their domains from email spoofing. In this document, we describe...-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Phishing: Don't get reeled in - Get Cyber Safe 2021
How to protect yourself from phishing campaigns-
File available for download in the following formats:
- HTML
-
Catalogue Entry: The 7 red flags of phishing - Get Cyber Safe 2021
The 7 red flags you should check when you receive an email or text-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Cyber Security Awareness Month 2020 - Theme page - Get Cyber Safe 2021
CSAM Themes - shining a light on all the ways the internet allowed us to stay connected and find a new "normal" in our lives.-
File available for download in the following formats:
- HTML
-
Catalogue Entry: Cyber Security Playbook for Elections Authorities (ITSM.10.021)
"This cyber security playbook guides elections authorities on anticipating, mitigating, and responding to threats that are specific to Canada’s democratic processes. This...-
File available for download in the following formats:
- HTML