Top 10 IT Security Actions

Top 10 It Security Actions

 

The Government of Canada has a critical role to play in protecting the information of Canadians. Without proper IT security measures, your organization is vulnerable and at risk of compromise. Stolen information, damaged reputations, and lost resources are scenarios that no organization wants to face.

The Cyber Centre's advice and guidance will help you build a strong IT infrastructure and protect your networks. Our Top 10 IT Security Actions were selected and prioritized based on our analysis of cyber threat trends affecting Internet-connected networks. When implemented as a set, the Top 10 help minimize intrusions or the impacts to a network if a successful cyber intrusion occurs.

Long description

Threat surface before the top 10

  1. Use Shared Services Canada Internet Gateways
  2. Patch operating systems and applications
  3. Enforce the management of administrative privileges
  4. Harden operating systems
  5. Segment and separate information
  6. Provide tailored awareness and training
  7. Manage devices at the enterprise level
  8. Apply protection at the host level
  9. Isolate web-facing applications
  10. Implement application allow lists

Threat surface after the top 10

 

View our Top 10 video series

Top 10 Overview

Want to know more about the benefits of the Top 10? We’ve got you covered.

Use SSC Internet Gateways

Use SSC Internet Gateways

Make your internet connection work for you, not threat actors. Learn more about the benefits.

 
Patch Operating Systems and Applications

Patch Operating Systems and Applications

Do you have an automated patch management framework in place? Learn more about why this is critical to your operations.

Enforce the Management of Administrative Privileges

Enforce the Management of Administrative Privileges

Do you regularly review who has administrative privileges on your networks? Learn more about why you should.

Segment and Separate Information

Segment and Separate Information

Do you know where and how your information is stored on your networks? Learn more about why this is important.

 
 

Resources

 
We are Cyber Security

We are Cyber Security

Contact Us
cyber.gc.ca
1-833-CYBER-88
 
Date modified: