| Line 46: |
Line 46: |
| | *Disable or limit the ability to install applications on devices such as laptops and smartphones. | | *Disable or limit the ability to install applications on devices such as laptops and smartphones. |
| | *Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable. | | *Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable. |
| | + | |
| | + | When traveling to foreign countries it is important to stay vigilant and remember acceptable use policies such as the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32611 Directive on Security Management] as well as [https://cyber.gc.ca/en/guidance/mobile-devices-and-business-travellers-itsap00087 Mobile Devices and Business Travellers]. If there are no private networks available, use a VPN when connecting to public wifi. |
| | + | |
| | + | Considerations when using networks and VPNs in foreign countries: |
| | + | *Avoid using the "remember me" feature. |
| | + | *Disable location and wifi sharing. |
| | + | *Be aware of unusual connection attempts, connection attempts at unusual times, and unauthorized VPN activity. |
| | + | *Report any suspicious activity or incidents to an organizational IT Security Manager. |
| | + | |
| | + | For more information, read CSE's [https://cyber.gc.ca/sites/default/files/publications/itsb-88-eng.pdf Mobile Technologies in International Travel] guidance. |
| | | | |
| | ==Home Network Hardening== | | ==Home Network Hardening== |
| Line 78: |
Line 88: |
| | Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. | | Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android. |
| | | | |
| − | ==Criteria to consider when choosing a collaborative application== | + | ==Criteria to Consider when Choosing a Collaborative Application== |
| | When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's [https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF publication]: | | When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's [https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF publication]: |
| | | | |
| Line 86: |
Line 96: |
| | *Can users see and control who connects to collaboration sessions? | | *Can users see and control who connects to collaboration sessions? |
| | *Does the service privacy policy allow the vendor to share data with third parties or affiliates? | | *Does the service privacy policy allow the vendor to share data with third parties or affiliates? |
| − |
| |
| | *Do users have the ability to securely delete data from the service and its repositories as needed? | | *Do users have the ability to securely delete data from the service and its repositories as needed? |
| − |
| |
| | *Has the collaboration service’s source code been shared publicly (e.g. open source)? | | *Has the collaboration service’s source code been shared publicly (e.g. open source)? |
| | *Is the service developed and/or hosted under the jurisdiction of a government with laws that could jeopardize government standards and policy? | | *Is the service developed and/or hosted under the jurisdiction of a government with laws that could jeopardize government standards and policy? |
| | + | |
| | == References == | | == References == |
| | *[https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf Secure Teleworking Bulletin - NIST Publication] | | *[https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf Secure Teleworking Bulletin - NIST Publication] |