| Line 3: |
Line 3: |
| | {| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px" | | {| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px" |
| | |- | | |- |
| − | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working |Overview and User Considerations]] | + | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Overview|Overview and User Considerations]] |
| | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]] | | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]] |
| | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]] | | ! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]] |
| Line 68: |
Line 68: |
| | *Avoid using "remember me" features for apps and websites. | | *Avoid using "remember me" features for apps and websites. |
| | | | |
| − | ==Social Media== | + | ==Social Media and Messaging== |
| | + | Social media services surround our device and most of the time have broad access to areas of a device that are not commonly associated with social media apps such as Facebook, Instagram, and Twitter. |
| | + | |
| | + | In order to protect devices and personal information, consider: |
| | + | |
| | + | *Using Social Media only on personal devices. |
| | + | *Having a strong passhrase, or passcode. |
| | + | *Use two-factor authentication when possible. |
| | + | *Avoid posting specific work-related details such as office location, on-going work projects, images of workstations and employee duties. |
| | + | *Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible. |
| | + | *Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place. |
| | + | |
| | + | ==Networking Devices and Internet Appliances== |
| | + | ===Cloud Services=== |
| | + | Cloud providers offer services that allow file storage, compute power, e-mail, office tools, and remote access (to name a few), which can be accessed remotely by logging into a control panel or server. |
| | + | |
| | + | Best practices when using these services include: encrypting sensitive data, use anti-malware and backup services provided by the cloud service provider (CSP), inquire on where the data is being physically stored. |
| | + | |
| | + | For more best practices and information on protecting a cloud environment visit the [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Initiative page] on GCpedia. |
| | | | |
| | | | |
| | |} | | |} |