Difference between revisions of "Secure Remote Work Technical Considerations"
Line 43: | Line 43: | ||
*Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable. | *Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable. | ||
− | == | + | ==Home Network Hardening== |
− | + | Out of the box, most routers have generic passwords, are out of date, and often contain exploits that can easily be used to intercept, manipulate and store network traffic. However, there are a number of actions that you can take to mitigate these security issues at home. | |
− | + | *Enable Auto-Updates on endpoint devices. Not only on laptops and smartphones but also on the router itself. | |
− | * | + | *Disable remote management and administrator function. |
− | * | + | *Change the routers default password to something that is unique and adheres to the GC Password Guidance. |
− | * | + | *Ensure that any web-based management account for the router is also using a strong, unique password. |
− | * | + | *Place IoT devices on a separate router or VLAN. |
+ | *Double check which device address' are connecting to the router if possible. | ||
− | + | For more information, check out this CyberScoop report. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | For more information | ||
− | |||
− | |||
− | |||
== References == | == References == |
Revision as of 09:56, 30 March 2020
Secure Teleworking - User Considerations | Secure Teleworking - Technical Considerations |
---|
What is Teleworking?As cloud technology, collaborative applications and internet connectivity increase, teleworking is becoming more prevalent than ever before. Teleworking is often done through the following ways:
Threats and Challenges posed by TeleworkingBy connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information. Security issues may include:
Mitigation and Prevention MeasuresAs the employee will be connect via the internet to potentially classified data and applications it is important that measures are taken to reduce the risk of a security breach. Some helpful considerations to implement include:
Home Network HardeningOut of the box, most routers have generic passwords, are out of date, and often contain exploits that can easily be used to intercept, manipulate and store network traffic. However, there are a number of actions that you can take to mitigate these security issues at home.
For more information, check out this CyberScoop report. References
|