Changes

Jump to navigation Jump to search
no edit summary
Line 3: Line 3:  
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
{| class="wikitable" style="align:center; border-top: #000000 2px solid; border-bottom: #000000 2px solid; border-left: #000000 2px solid; border-right: #000000 2px solid" width="1125px"
 
|-
 
|-
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working |Overview and User Considerations]]
+
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Working - Overview|Overview and User Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Remote Work Technical Considerations|Technical Considerations]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
 
! style="background: #2e73b6; color: white" width="250px" height="40px" scope="col" |[[Secure Use of Collaboration Tools|Secure Use of Collaboration Tools]]
Line 48: Line 48:     
====Bluetooth====
 
====Bluetooth====
 +
For devices that have bluetooth capabilities, consider the following:
 +
 +
*Disable bluetooth when not in use.
 +
*Turn off "discovery" or broadcast mode.
 +
*Avoid pairing the device via bluetooth in a public space.
 +
*Do not use bluetooth keyboards to type sensitive text.
 +
*Pair with only recognized devices such as personal headphones or home audio systems.
 +
*For Apple devices, disable the AirDrop feature.
 +
 +
====Authentication on Mobile Devices====
 +
There are multiple ways of securing mobile devices such as using biometrics like a fingerprint or retina scan, and traditional passphrases or PIN numbers. While all of these are better than having no authentication at all, it is important that passphrases are robust, PIN numbers are random and uneasily guessable. An example of what NOT to do is to have your birth year as your PIN. This is easily guessable by the most trivial types of attackers, which can leave your device and data open for attack.
 +
 +
When setting up authentication on these devices, consider the following:
 +
 +
*Avoid using personal numbers, phrases or names when creating a password. Try using something that people might not be able to guess. An example that would be easy to remember would be to use the first letter of each word in a phrase. For example the phrase "I played competitive hockey as a kid and my number was 19!" could be converted into a password such as "Ipchaakam#w19!"
 +
*Create complex passwords involving special characters ("@", "#", "&", "_"), numbers, and capital and lowercase characters.
 +
*Avoid substituting numbers for letters or symbols. For example, "P@$$W0RD1" is not a secure password.
 +
*Enable Two-Factor Authentication (2FA). Choose to authenticate via an "authenticator" app which provides a one-time passcode. Most times SMS is the default second factor however this can be spoofed with a method called sim-swapping.
 +
*Avoid using "remember me" features for apps and websites.
 +
 +
==Social Media and Messaging==
 +
Social media services surround our device and most of the time have broad access to areas of a device that are not commonly associated with social media apps such as Facebook, Instagram, and Twitter.
 +
 +
In order to protect devices and personal information, consider:
 +
 +
*Using Social Media only on personal devices.
 +
*Having a strong passhrase, or passcode.
 +
*Use two-factor authentication when possible.
 +
*Avoid posting specific work-related details such as office location, on-going work projects, images of workstations and employee duties.
 +
*Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible.
 +
*Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place.
 +
 +
==Networking Devices and Internet Appliances==
 +
===Cloud Services===
 +
Cloud providers offer services that allow file storage, compute power, e-mail, office tools, and remote access (to name a few), which can be accessed remotely by logging into a control panel or server.
 +
 +
Best practices when using these services include: encrypting sensitive data, use anti-malware and backup services provided by the cloud service provider (CSP), inquire on where the data is being physically stored.
 +
 +
For more best practices and information on protecting a cloud environment visit the [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Initiative page] on GCpedia.
       
|}
 
|}

Navigation menu

GCwiki