| Line 46: | Line 46: | 
|  | *Disable or limit the ability to install applications on devices such as laptops and smartphones. |  | *Disable or limit the ability to install applications on devices such as laptops and smartphones. | 
|  | *Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable. |  | *Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable. | 
|  | + |  | 
|  | + | When traveling to foreign countries it is important to stay vigilant and remember acceptable use policies such as the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32611 Directive on Security Management] as well as [https://cyber.gc.ca/en/guidance/mobile-devices-and-business-travellers-itsap00087 Mobile Devices and Business Travellers]. If there are no private networks available, use a VPN when connecting to public wifi. | 
|  | + |  | 
|  | + | Considerations when using networks and VPNs in foreign countries: | 
|  | + | *Avoid using the "remember me" feature. | 
|  | + | *Disable location and wifi sharing.  | 
|  | + | *Be aware of unusual connection attempts, connection attempts at unusual times, and unauthorized VPN activity. | 
|  | + | *Report any suspicious activity or incidents to an organizational IT Security Manager. | 
|  | + |  | 
|  | + | For more information, read CSE's [https://cyber.gc.ca/sites/default/files/publications/itsb-88-eng.pdf Mobile Technologies in International Travel] guidance. | 
|  |  |  |  | 
|  | ==Home Network Hardening== |  | ==Home Network Hardening== | 
| Line 77: | Line 87: | 
|  |  |  |  | 
|  | Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. |  | Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. | 
|  | + |  | 
|  | + | ==Criteria to Consider when Choosing a Collaborative Application== | 
|  | + | When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's [https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF publication]: | 
|  | + |  | 
|  | + | *Does the application the application support end-to-end (E2E) encryption? | 
|  | + | *Are strong, well-known, testable encryption standards used? | 
|  | + | *Is multi-factor authentication (MFA) used to validate users’ identities? | 
|  | + | *Can users see and control who connects to collaboration sessions? | 
|  | + | *Does the service privacy policy allow the vendor to share data with third parties or affiliates? | 
|  | + | *Do users have the ability to securely delete data from the service and its repositories as needed? | 
|  | + | *Has the collaboration service’s source code been shared publicly (e.g. open source)? | 
|  | + | *Is the service developed and/or hosted under the jurisdiction of a government with laws that could jeopardize government standards and policy? | 
|  |  |  |  | 
|  | == References == |  | == References == | 
| Line 86: | Line 108: | 
|  | *[https://wiki.gccollab.ca/images/4/4e/Orientation_sur_la_facilitation_de_l%E2%80%99acc%C3%A8s_aux_services_Web.pdf Orientation sur la facilitation de l’accès aux services Web - SCT] |  | *[https://wiki.gccollab.ca/images/4/4e/Orientation_sur_la_facilitation_de_l%E2%80%99acc%C3%A8s_aux_services_Web.pdf Orientation sur la facilitation de l’accès aux services Web - SCT] | 
|  | *[https://onezero.medium.com/slack-zoom-google-hangouts-are-your-remote-work-apps-spying-on-you-cf1e33809cf7 Slack, Zoom, Google Hangouts: Are Your Remote Work Apps Spying on You?] |  | *[https://onezero.medium.com/slack-zoom-google-hangouts-are-your-remote-work-apps-spying-on-you-cf1e33809cf7 Slack, Zoom, Google Hangouts: Are Your Remote Work Apps Spying on You?] | 
|  | + | *[https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF Selecting and using collaborative tools securely - NSA] | 
|  | *[[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|Starter Guide for Taking Part in a Zoom Call - EN]] |  | *[[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|Starter Guide for Taking Part in a Zoom Call - EN]] | 
|  | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |  | *[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]] |