Line 3: |
Line 3: |
| {| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px" | | {| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px" |
| |- | | |- |
− | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working |Overview and User Considerations]] | + | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Overview|Overview and User Considerations]] |
| ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]] | | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]] |
| ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]] | | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]] |
Line 79: |
Line 79: |
| *Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible. | | *Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible. |
| *Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place. | | *Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place. |
| + | |
| + | ==Networking Devices and Internet Appliances== |
| + | ===Cloud Services=== |
| + | Cloud providers offer services that allow file storage, compute power, e-mail, office tools, and remote access (to name a few), which can be accessed remotely by logging into a control panel or server. |
| + | |
| + | Best practices when using these services include: encrypting sensitive data, use anti-malware and backup services provided by the cloud service provider (CSP), inquire on where the data is being physically stored. |
| + | |
| + | For more best practices and information on protecting a cloud environment visit the [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Initiative page] on GCpedia. |
| | | |
| | | |
| |} | | |} |