CSE’s Top 10 IT Security Actions

Want to know more about the benefits of the Top 10? We’ve got you covered.

Watch more of our Top 10 video series.



CSE’s Top 10 IT Security Actions - HTML5 Transcript/Captions

( This video opens to the Communications Security Establishment logo on a black background. It is followed by a series of night shots depicting city streets and buildings in time-lapse.)

The internet is crucial to our work. But it can be used against us.

A time-lapse sequence of the Toronto skyline at dawn is shown as the title appears: “Communications Security Establishment - Top 10 IT Security Actions.”)

The Communications Security Establishment’s unique insight will help you understand the threat. And our expert advice will help you prevent it.

(Outside shot of the CSE building. Inside a conference room, employees are having a video conference with two IT security professionals. A television can be seen in the background, it is showing a news broadcast. This phrase appears at the bottom of the television screen: “Canada’s government servers hacked in cyber attack, personal information stolen.”)

(Greta Bossenmaier, Chief of the Communications Security Establishment faces the camera.)

Cyber security is critical to your operations. And it’s CSE’s speciality. Our IT Security professionals work

(Back to the conference room, then switches to a desk where two IT security professionals work together on a computer.)

every day to thwart cyber threats. And with that experience guiding them, they’ve

(Greta Bossenmaier has a discussion with a man holding an electronic tablet. The Top 10 IT Security Actions appear next to them in an inverted triangle shape: Threat Surface Before the Top 10. Use Shared Services Canada Internet Gateways. Patch Operating Systems and Applications. Enforce the Management of Administrative Privileges. Harden Operating Systems. Segment and Separate Information. Provide Tailored Awareness and Training. Manage Devices at the Enterprise Level. Apply Protections at the Host Level. Isolate Web-facing Applications. Implement Application Whitelisting. Threat Surface After the Top 10. Close-up of the electronic tablet, we can see a stylized graphic showing the threat surface diminishing.)

created CSE’s Top 10 IT Security Actions. Ten steps that your department should take to make sure that your information and networks are safe and secure.

(A daytime time-lapse sequence of the parliament building. A time-lapse sequence of Canadian customs in an airport. A woman hands her passport to a border services officer. He scans her passport. The next shot is of a woman navigating her electronic tablet while waiting in a subway station. A holographic effect next to her illustrates that she looking at financial information. In a factory, a man and a woman wearing safety helmets and protective glasses walk alongside each other as the man holds an electronic tablet up. The tablet displays 3D technical schematics. In a laboratory, a female researcher examines data on her laptop. This is followed by a shot of a woman sitting at her home desk as she enters her SIN card information into a Government of Canada form online.)

Government of Canada networks store critical operational details. Finances. Information about Canadian industry. Research and development. Not to mention the data of Canadians.

(Sitting at a desk in an office space, a man flips through his applications on a BlackBerry. This is illustrated with a holographic screen next to his phone. A woman sitting on a park bench sends an email on her smartphone. A holographic animated green security lock icon appears next to the screen to depict message encryption.)

All of this information is valuable.

(Shot of an office worker at his desk quickly followed by another worker in her cubicle. She is texting. A holographic word balloon is shown next to her phone. The words: “Please send me your travel details”, appear as she types them. A balding man seen from behind checks his email, and three employees are visible in the background. In the following shot, a woman sits at her work station. She is looking at courses offered on the CSE website. A vast office with many employees at their workstations is shown. A holographic effect depicts them being connected by blue lines. Abruptly, most of the blue connecting lines turn red. Alert icons pop up over the heads of the office workers. A rewind effect returns the connecting lines to their original color.)

And because it’s valuable, there are people, organizations and countries that want to break into your networks to get it. And they’ll stop at nothing.

(A time-lapse sequence of the sky at dusk shows clouds passing over the CSE building.)

So as the Government of Canada, what do we do to protect it?

(Ron Parker, President of Shared Services Canada faces the camera.)

As a community, we work together to secure and protect Government of Canada networks. By being proactive and adopting the Top 10, we can all benefit from the proven security measures.

(A series of time-lapses depicting city streets are shown. Cars and pedestrians pass in rapid succession. A Government of Canada office building is shown; inside, employees are hard at work.)

Cyber intrusions are costly. To your operations. To your reputation. And to your service delivery. And since Government of Canada systems are interconnected, what affects one department affects us all.

(Yaprak Baltacioglu, Secretary of the Treasury Board of Canada Secretariat faces the camera.)

CSE’s Top 10 are smart, practical actions that any department can implement. They work and provide a lasting impact. There’s just too much at stake not to do them.

(A woman is seen from behind seated at her work station. She is in a vast open office space with many colleagues also at their workstations. There is a time lapse sequence of the employees working.)

So we all need to work together. That’s what CSE’s Top 10 is all about.

(The CSE building exterior is shown in its entirety. Multicolored triangles reminiscent of the CSE building’s triangular windows appear to form a motif. Inside it, the words: “Advice Guidance Services” emerge.)

Protect your networks. Protect Canada’s information.

(The words are then replaced with the CSE Web site address: “cse-cst.gc.ca”.)

Visit CSE online to learn more about the Top 10.