Changes

Jump to navigation Jump to search
Line 46: Line 46:  
*Disable or limit the ability to install applications on devices such as laptops and smartphones.
 
*Disable or limit the ability to install applications on devices such as laptops and smartphones.
 
*Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable.
 
*Use CCCS/CSE [https://cyber.gc.ca/sites/default/files/publications/itsp.40.111-eng_1.pdf approved cryptography] when applicable.
 +
 +
When traveling to foreign countries it is important to stay vigilant and remember acceptable use policies such as the [https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32611 Directive on Security Management] as well as [https://cyber.gc.ca/en/guidance/mobile-devices-and-business-travellers-itsap00087 Mobile Devices and Business Travellers]. If there are no private networks available, use a VPN when connecting to public wifi.
 +
 +
Considerations when using networks and VPNs in foreign countries:
 +
*Avoid using the "remember me" feature.
 +
*Disable location and wifi sharing.
 +
*Be aware of unusual connection attempts, connection attempts at unusual times, and unauthorized VPN activity.
 +
*Report any suspicious activity or incidents to an organizational IT Security Manager.
 +
 +
For more information, read CSE's [https://cyber.gc.ca/sites/default/files/publications/itsb-88-eng.pdf Mobile Technologies in International Travel] guidance.
    
==Home Network Hardening==
 
==Home Network Hardening==
Line 78: Line 88:  
Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android.
 
Canadian Shield is offered on workstations, laptops, tablets and smartphones that are running iOS or Android.
   −
==Criteria to consider when choosing a collaborative application==
+
==Criteria to Consider when Choosing a Collaborative Application==
 
When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's [https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF publication]:
 
When choosing or deciding which public applications to use for your work, consider the following excerpt from the Nation Security Agency's [https://media.defense.gov/2020/Apr/24/2002288652/-1/-1/0/CSI-SELECTING-AND-USING-COLLABORATION-SERVICES-SECURELY-LONG-FINAL.PDF publication]:
   Line 86: Line 96:  
*Can users see and control who connects to collaboration sessions?
 
*Can users see and control who connects to collaboration sessions?
 
*Does the service privacy policy allow the vendor to share data with third parties or affiliates?
 
*Does the service privacy policy allow the vendor to share data with third parties or affiliates?
   
*Do users have the ability to securely delete data from the service and its repositories as needed?
 
*Do users have the ability to securely delete data from the service and its repositories as needed?
   
*Has the collaboration service’s source code been shared publicly (e.g. open source)?
 
*Has the collaboration service’s source code been shared publicly (e.g. open source)?
 
*Is the service developed and/or hosted under the jurisdiction of a government with laws that could jeopardize government standards and policy?
 
*Is the service developed and/or hosted under the jurisdiction of a government with laws that could jeopardize government standards and policy?
 +
 
== References ==
 
== References ==
 
*[https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf Secure Teleworking Bulletin - NIST Publication]
 
*[https://csrc.nist.gov/CSRC/media/Publications/Shared/documents/itl-bulletin/itlbul2020-03.pdf Secure Teleworking Bulletin - NIST Publication]

Navigation menu

GCwiki