Changes

Jump to navigation Jump to search
Line 3: Line 3:  
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
|-
 
|-
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Teleworking |Overview and User Considerations]]
+
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Overview|Overview and User Considerations]]
! style="background: #2e73b6; color: red" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Secure Remote Work Technical Considerations]]
+
! style="background: #2e73b6; color: red" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
 +
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Device Considerations|Device Considerations]]
 
|}
 
|}
 
{| style="width:1125px;"
 
{| style="width:1125px;"
Line 45: Line 46:  
*Disable or limit the ability to install applications on devices such as laptops and smartphones.
 
*Disable or limit the ability to install applications on devices such as laptops and smartphones.
 
*Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable.
 
*Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable.
 +
 +
When traveling to foreign countries it is important to stay vigilant and remember acceptable use policies such as the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32611 Directive on Security Management] as well as [https://cyber.gc.ca/en/guidance/mobile-devices-and-business-travellers-itsap00087 Mobile Devices and Business Travellers]. If there are no private networks available, use a VPN when connecting to public wifi.
 +
 +
Considerations when using networks and VPNs in foreign countries:
 +
*Avoid using the "remember me" feature.
 +
*Disable location and wifi sharing.
 +
*Be aware of unusual connection attempts, connection attempts at unusual times, and unauthorized VPN activity.
 +
*Report any suspicious activity or incidents to an organizational IT Security Manager.
 +
 +
For more information, read CSE's [https://cyber.gc.ca/sites/default/files/publications/itsb-88-eng.pdf Mobile Technologies in International Travel] guidance.
    
==Home Network Hardening==
 
==Home Network Hardening==
Line 65: Line 76:     
For more information, check out this [https://www.cyberscoop.com/dns-hijacking-covid-19-oski-bitdefender-telework/ CyberScoop report].
 
For more information, check out this [https://www.cyberscoop.com/dns-hijacking-covid-19-oski-bitdefender-telework/ CyberScoop report].
 +
 +
===Canadian Shield===
 +
The Canadian Internet Registration Authority (CIRA) have recently launched a free protected DNS service that prevents users from connecting to malicious websites and hosts.
 +
 +
Over 80% of cyber attacks leverage DNS servers. If attackers are able to connect your device to their compromised DNS, they can begin dropping and installing malware.
 +
 +
DNS servers translate human readable addresses into machine readable addresses. For example, if the "wiki.gccollab.ca" address is typed in on a web browser in a human language, the DNS server will match the address to another machine readable address as a set of numbers like "52.139.83.135".
 +
 +
Canadian Shield uses data and threat intelligence to determine which DNS address request is being sent and if it is likely to be malicious. Once Canadian Shield determines that it is in fact malicious, it blocks the your request preventing your device from being infected.
 +
 +
Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android.
 +
 +
==Criteria to Consider when Choosing a Collaborative Application==
 +
When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's [https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF publication]:
 +
 +
*Does the application the application support end-to-end (E2E) encryption?
 +
*Are strong, well-known, testable encryption standards used?
 +
*Is multi-factor authentication (MFA) used to validate users’ identities?
 +
*Can users see and control who connects to collaboration sessions?
 +
*Does the service privacy policy allow the vendor to share data with third parties or affiliates?
 +
*Do users have the ability to securely delete data from the service and its repositories as needed?
 +
*Has the collaboration service’s source code been shared publicly (e.g. open source)?
 +
*Is the service developed and/or hosted under the jurisdiction of a government with laws that could jeopardize government standards and policy?
    
== References ==
 
== References ==
Line 74: Line 108:  
*[https://wiki.gccollab.ca/images/4/4e/Orientation_sur_la_facilitation_de_l%E2%80%99acc%C3%A8s_aux_services_Web.pdf Orientation sur la facilitation de l’accès aux services Web - SCT]
 
*[https://wiki.gccollab.ca/images/4/4e/Orientation_sur_la_facilitation_de_l%E2%80%99acc%C3%A8s_aux_services_Web.pdf Orientation sur la facilitation de l’accès aux services Web - SCT]
 
*[https://onezero.medium.com/slack-zoom-google-hangouts-are-your-remote-work-apps-spying-on-you-cf1e33809cf7 Slack, Zoom, Google Hangouts: Are Your Remote Work Apps Spying on You?]
 
*[https://onezero.medium.com/slack-zoom-google-hangouts-are-your-remote-work-apps-spying-on-you-cf1e33809cf7 Slack, Zoom, Google Hangouts: Are Your Remote Work Apps Spying on You?]
 +
*[https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF Selecting and using collaborative tools securely - NSA]
 
*[[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|Starter Guide for Taking Part in a Zoom Call - EN]]
 
*[[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|Starter Guide for Taking Part in a Zoom Call - EN]]
 
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]
 
*[[:en:images/0/09/FR_-_Guide_de_démarrage_pour_participer_un_appel_Zoom.pdf|Guide de démarrage pour participer un appel Zoom - FR]]

Navigation menu

GCwiki