Changes

no edit summary
Line 3: Line 3:  
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
|-
 
|-
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working |Overview and User Considerations]]
+
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Overview|Overview and User Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
Line 66: Line 66:  
*Avoid substituting numbers for letters or symbols. For example, "P@$$W0RD1" is not a secure password.
 
*Avoid substituting numbers for letters or symbols. For example, "P@$$W0RD1" is not a secure password.
 
*Enable Two-Factor Authentication (2FA). Choose to authenticate via an "authenticator" app which provides a one-time passcode. Most times SMS is the default second factor however this can be spoofed with a method called sim-swapping.  
 
*Enable Two-Factor Authentication (2FA). Choose to authenticate via an "authenticator" app which provides a one-time passcode. Most times SMS is the default second factor however this can be spoofed with a method called sim-swapping.  
*Avoid using "remember me" for apps and websites.
+
*Avoid using "remember me" features for apps and websites.
 +
 
 +
==Social Media and Messaging==
 +
Social media services surround our device and most of the time have broad access to areas of a device that are not commonly associated with social media apps such as Facebook, Instagram, and Twitter.
 +
 
 +
In order to protect devices and personal information, consider:
 +
 
 +
*Using Social Media only on personal devices.
 +
*Having a strong passhrase, or passcode.
 +
*Use two-factor authentication when possible.
 +
*Avoid posting specific work-related details such as office location, on-going work projects, images of workstations and employee duties.
 +
*Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible.
 +
*Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place.
 +
 
 +
==Networking Devices and Internet Appliances==
 +
===Cloud Services===
 +
Cloud providers offer services that allow file storage, compute power, e-mail, office tools, and remote access (to name a few), which can be accessed remotely by logging into a control panel or server.
 +
 
 +
Best practices when using these services include: encrypting sensitive data, use anti-malware and backup services provided by the cloud service provider (CSP), inquire on where the data is being physically stored.
 +
 
 +
For more best practices and information on protecting a cloud environment visit the [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Initiative page] on GCpedia.
 +
 
    
|}
 
|}