Support

support@partek.ca

Contact

(403) 488-3333

CyberSecure Canada:

CyberSecure Canada Framework

The Cybersecure Canada Framework is a voluntary federal certification program designed to help small and medium-sized enterprises (SMEs) in Canada enhance their cybersecurity practices.

By implementing a set of 13 baseline security controls, organizations can better protect themselves against cyber threats, build trust with customers, and gain a competitive advantage. The framework aims to promote a secure digital economy by providing practical and achievable measures that improve overall cybersecurity resilience.

Develop an Incident Response Plan

Develop an Incident Response Plan

Create a plan to identify, manage, and recover from cybersecurity incidents. This includes defining roles, communication strategies, and recovery procedures.

Automatically Patch Operating Systems and Applications

Ensure that all software and operating systems are regularly updated and patched to protect against known vulnerabilities.

Securely Configure Devices

Customize device settings to enhance security, disable unnecessary features, and enforce strong security policies.

Enable Security Software

Install and maintain security software such as antivirus, anti-malware, and firewalls to protect against threats.

Use Strong User Authentication

Implement multi-factor authentication and strong password policies to verify user identities and prevent unauthorized access

Provide Employee Awareness Training

Educate employees about cybersecurity best practices, phishing, and social engineering to reduce human error and enhance security awareness

Back Up and Encrypt Data

Regularly back up important data and use encryption to protect data both in transit and at rest

Secure Mobility

Implement security measures for mobile devices, such as encryption, remote wipe capabilities, and secure access controls

Establish Basic Perimeter Defenses

Use firewalls, intrusion detection systems, and other perimeter defenses to protect the network from external threats

Secure Cloud and Outsourced IT Services

Ensure that cloud services and outsourced IT providers follow strong security practices and comply with your organization's security policies

Secure Websites

Implement security measures for websites, such as HTTPS, secure coding practices, and regular vulnerability assessments

Implement Access Control and Authorization

Use role-based access control and the principle of least privilege to ensure that users only have access to the resources they need

Secure Portable Media

Protect portable media, such as USB drives and external hard drives, with encryption and secure handling procedures to prevent data loss and unauthorized access

By making cybersecurity a priority, your business can reduce its risk of becoming the next victim of a cyberattack.

Take action now to protect your company, your data, and your reputation.