The federal government of Canada’s new Centre for Cyber Security CCCS recently announced a new two-year cybersecurity program. The goal of the new program, CyberSecure Canada, is to help small and medium-sized businesses (SMBs) achieve a minimum required level of cybersecurity.
The program is also focused on increasing consumer confidence in the digital economy, promoting international standardization, and giving SMBs the ability to better compete globally.
The certification is comprised of a baseline set of cybersecurity controls developed by the Canadian Centre for Cyber Security. These controls include establishing an incident response plan, regularly patching operating systems and applications, and using security software and securely configuring devices.
SMBs must implement the following 13 controls to achieve certification:
- Develop an Incident Response Plan
- Automatically Patch Operating Systems and Applications
- Enable Security Software
- Securely Configure Devices
- Use Strong User Authentication
- Provide Employee Awareness Training
- Backup and Encrypt Data
- Secure Mobility
- Establish Basic Perimeter Defences
- Secure Cloud and Outsourced IT Services
- Secure Websites
- Implement Access Control and Authorization
- Secure Portable Media
How we can help
Three of these critical controls can be addressed with Tehama to help SMBs achieve certification; secure perimeters, secured cloud and outsourced IT services, and implementing access controls.
With Tehama's secure and compliant virtual desktops SMBs can quickly and securely onboard employees and third-party IT services providers to access data sensitive systems. Tehama enables any end user device to securely connect to systems without the risk of malware intrusion or data breaches and intellectual property theft.
Tehama provides all the components for secure cloud-based Windows or Linux workspaces, including dedicated encrypted network channels, firewalls, access and role restrictions, storage, and end-user compute infrastructure (virtual and secured desktops with auto-patching and updates to keep your OS secure), and deep audit logs within a secured perimeter called a Room —making it easier for you to achieve your cybersecurity goals.
Each secure virtual room is configured to work directly with the user’s network via the Tehama gateway, which encrypts and restricts all traffic flow to within your network only. The secured network eliminates the risk of third-party attacks. Virtual desktops are accessible via the Tehama Web UI —that requires strong MFA authentication.
Session recordings show all user activity performed in a room, right down to the keystroke, for exceptionally accurate auditing as well as forensic analysis and live viewing for training and monitoring purposes. The File Vault is an encrypted storage volume that enables secure information-sharing, fully isolated from any other Rooms to ensure zero data leakage. The Secrets Vault provides secure storage of credentials and firewall rules for privileged-access assets — with masking to prevent the possibility of copying credentials outside the Tehama platform.
Enhanced Security and Compliance
Tehama allows you to set strict policies for data and application access with robust user identity management and “just-in-time” user provisioning through SCIM and SAML. Access to credentials and other assets is available only after successful two-factor authentication and single-use passwords prevent access after a session has ended. Tehama is SOC 2 Type II certified by Deloitte, proof of our mature processes and strict adherence to compliance regulations.
Find out how Tehama can help you achieve your cybersecurity goals today.