Talent Development Centre

Tag Archives: security

All Talent Development Centre posts for Canadian technology contractors relating to security and security clearances.

It’s 2019. Do You Know Where Your Data Is?

There’s little such thing as privacy in this world. If you use the Internet and access any major technology platform, your data is almost definitely being captured in some form or another. How often do you think about what kind of information is out there and who has access to it?

Unless you’re extremely diligent, you can guarantee that at least one of the major players — Google, Facebook, Apple, Twitter, Amazon or Microsoft — has some data on you. And this infographic from Security Baron tells you what they might have.

Even though the infographic isn’t even a year old yet, it already contains some outdated information (Google+ doesn’t exist anymore). Still, it remains an eye-opener and accurate on most fronts.

The Data Big Tech Companies Have On You - SecurityBaron.com - Infographic
By SecurityBaron.com

Companies Are Tracking Your Entire Life

Have you ever received a call or email from a recruiter and thought “How did this person get my information?” We receive that question a lot and even wrote a post with some explanations a couple years go. While IT recruiters can definitely be resourceful in finding skilled contractors, that’s nothing compared to what large corporations have on you.

This video from Bright Side explains that every time you download a free app or access some websites, you are being tracked. Companies are gathering your information and selling it to marketers so they can target you. Some consumers say they don’t mind, but many frequently express concerns with these practices. This video not only gives the scary details about how companies are getting your data, it also gives tips to protect yourself.

Is There a Hidden Spy App on Your Cell Phone?

The world can be a scary place with bumps and bangs around every corner. However, we often look past the silent threats which can sometimes be the most dangerous. With phones getting increasingly more complex and “smarter” with every release, hackers have become harder to catch, let alone notice.

Do you want to make sure your phone is safe? The first step is to detect a problem as quickly as possible. Check out this infographic from FamilyOrbit for more information and forward it to your friends and family who have cell phones and protect them from the unseen dangers that could be just a double tap away.

How to Detect Hidden Spy App on Android or iOS – Infographic - An Infographic from Family Orbit Blog
Embedded from Family Orbit Blog

Ensure You’re Working on a Secure Device… But Don’t Spend Time Securing It

The following guest post was provided by NPC

IT and professional contractors are the definitive mobile professional.  Moving between jobs that can be anywhere from a few days to a few years, mobility, adaptability and professionalism are essential to their success. They’ve been mastering the “gig economy” long before it was topical. Many contractors make exceptional money, better sometimes than their permanent-staff counterparts. The difference between the winners and losers may not be the luck of the draw on the positions they land, but how they organize and present themselves. Running an efficient and secure one-person office is critical to being able to focus on the work opportunity, and to maximize revenue generating hours.

But as solo entrepreneurs, how a contractor spends their time doing just that is important.  Like it is for any professional, time is money. It’s reasonably certain that someone who owns a car dealership no longer changes their own oil. Smart producers look carefully at their operational responsibilities and how they spend their time. They watch for opportunities to offload a task to someone that can do it faster-better-cheaper. Even though it may be a task they know how to do themselves, once the value of their skills overtakes the value of the task, they offload it.

As-a-Service models are related to and fast becoming as ubiquitous as Cloud Computing. They are great opportunities for professionals of all types to offload some of the time-consuming and low value work that is not only a bit of pain to keep up with, but takes away from either their revenue producing work, or, more importantly, precious personal and family time.

An example of this is NPC DataGuard’s secure managed computer offering. For a single monthly fee NPC will provide a professional with a top-of-line laptop, desktop or hybrid tablet, that is already sourced, configured, and secured with industry leading backup and security tools.  Giving the responsibility to someone else to provide a computer that is built, managed and monitored, always in warranty, with single-point-of-contact 24/7 support, can be a big time saver for the Contractor.

For those jobs that require the contractor to “BYOD”, being secure and protecting their business interests, and that of their clients, is essential. The level of security that can be achieved in these types of specialized models is exceptional. Fully encrypted and biometric access devices will impress those clients that require you to work on a secure device. As well, as an example, NPC DataGuard’s Pro product comes with $5M in privacy breach remediation insurance if an NPC ever failed to protect critical personal information you may work on for your client.

The impact on a contractor from a lost, stolen or compromised device while in a contract can be devastating.  What is your plan today for such an event? What’s your personal Business Continuity Plan?  A secure managed computer includes a full back-up completed each day into a secure data centre.  A lost, stolen or damaged device can be replaced with data restored, saving you countless hours doing it yourself and getting you back to work.

“As-a-Service” models offer products and services to ensure the contractor does not waste time on tasks that pay him or her less than what they can make, as well as levels of  technology performance that even an IT professional might find hard to achieve on their own.

Spending a lot of time buying, configuring and securing your own computer can now be a thing of the past. Key to driving top revenue is showing up professionally with military-grade security on a slick new computer and being able to focus on the opportunity at hand.

This guest post was submitted by our friends at NPC. Visit this page to learn more and to get a special offer for all of our readers.

Quick Poll Results: Are IT Professionals Concerned with Digital Security?

With the growing concern about privacy and security in today’s technology, we decided to turn to our network of technology experts to find out how serious they perceive the threat to actually be. Last month’s contractor quick poll asked how concerned you are with all of these breaches and hacks, and if you believe we all need to start being more vigilant online.

After a month of being published, we’ve had a number of responses and they’re still coming in. At this point, here’s what people are saying. Where do you fall on the spectrum?

How concerned are you about digital privacy and security?

Contractor Quick Poll: Does Digital Privacy and Security Keep You Up at Night?

The last few years have seen no shortage in hacks and data breaches. It seems every large company gets their time in the spotlight as they face public relations nightmares, explaining to customers that their data was breached and why it took so long to disclose it. Add to the mix privacy investigations of the world’s largest social networks like Facebook and Google, plus the damage a hacked smart home can do, and it’s no surprise that some people prefer to remain off the digital grid all together.

As an IT professional, you’re more knowledgeable than the average person on this topic, so it’s easier to identify risks and take precautions. Unfortunately, that added knowledge means you’re also cursed with enough information to better understand how easily your privacy can be breached and what kind of implications that can have.

In this month’s contractor quick poll, we want to know how technology experts view the current state of digital privacy and security. Are you less concerned because you know how to protect yourself or worried because you understand the threats that face us?

How Blockchain Technology Will Impact M-Commerce and Security Industry in 2019

Since its introduction, Blockchain technology has wowed the IT world with its multi-faceted use, and 2019 looks like it will be no different. While Blockchain has already made large amounts of headway in the mobile app development, retail, and financial sectors, it is beginning to dive further into app security, M-Commerce, and payments, which will in turn, make records tamper-proof and more reliable than ever before. In appTech’s infographic we are able to see just how Blockchain is affecting our ability to pay wirelessly using our phones, and how certain apps and concepts are becoming more secure the more developed they become.

How Blockchain Technology Will Impact M-Commerce and Security Industry in 2019

Obtaining a Federal Government Personnel Security Screening

All companies and organizations perform some sort of background check on employees and independent contractors before hiring them, but the extent of the check will vary. One organization in Canada known for its checks is the Federal Government, which requires nearly everybody who works with its information or assets to go through a degree of security screening. For IT professionals new to the government, this can be a long, intense and confusing process.

Types of Federal Government Security Screenings

As mentioned, nearly every individual who works for the feds will require some sort of security screening. There are a number of types and levels of screens. The one you will require depends on your role, project and information you’re accessing, but it will typically be one of the following 3:

  • Reliability Status (valid for 10 years and required when accessing Protected A, B or C information, assets or work sites)
  • Secret Clearance (valid for 10 years and required when accessing information classified as Secret)
  • Top Secret Clearance (valid for 5 years and required when accessing information classified as Top Secret)

The Federal Government Security Clearance Process

A federal government security screening should begin as soon as you become employed with a company or organization that will require access to protected or classified information. In theory, for independent contractors, that would be as soon as you start working for your own independent business, and your business should be the organization initiating the clearance through its own organization security clearance. However, due to various process and efficiency concerns, independent contractors will often obtain their personnel clearance through a Recruitment Agency, who will start the process as soon as they verify that you’re a potential fit for government contracts.

The complete screening process and all the requirements are extensive and you can find all of the information here. Reliability Status can take as little as 2 weeks where a Secret or Top Secret clearance is usually a minimum of 6 months and up to 2 years or longer. The length of time depends on the history of you and your immediate family, including the countries in which you lived and/or worked. More specifically, the screening will require:

  • Background checks (5-years for Reliability status and 10-years for Secret or Top Secret clearance)
  • Background checks of your immediate family (Secret and Top Secret clearances)
  • Law enforcement inquiry through the RCMP (fingerprinting)
  • Credit check
  • Loyalty check conducted by CSIS (Secret and Top Secret)
  • Passport photos (Top Secret)

Depending on your history, you may also be required to complete out-of-country verifications, interviews, and provide supporting documents.

Federal Government security screenings are owned by the organization who completed the screening. For example, if you received your clearance through your recruitment agency, it’s your agency who holds it. This also means that they have the ability to terminate your clearance when you no longer work with them. To be safe, many recruiters will ask you to complete a form to duplicate your clearance, meaning their agency will also hold your clearance. This way, if your first agency terminates your Reliability Status or Security Screening for any reason, it will still be valid and active through the second agency.

There’s no doubt that Federal Government Security Screenings can often be complex, confusing and frustrating. The best advice for getting through it is to remain as detail-oriented as possible, be prepared, and work with the Company Security Officer who is helping you obtain it. For more information, you can also visit https://www.canada.ca/en/services/defence/nationalsecurity/screening.html.

Dangerous Android Apps to Delete Immediately

Android users take note: there are dangerous apps that might be on your phone and you need to delete them. Google Play is great because it allows mobile app developers to easily distribute their latest innovations, but it also allows some sketchy, unethical developers to put their software onto your phone. The results lead to slow performance, drained battery life, viruses and even identity theft.

Brightside decided to look into this a bit deeper. They created this in-depth video with 12 dangerous apps that they recommend you delete immediately. As a technology professional, you may already be aware and diligent when downloading apps. Or if you’re an iPhone user you’re less concerned (although these tips could be relevant to you as well). Either way, we strongly recommend watching this video, or at least sharing it with an Android user who’s less careful when downloading apps.

Are You Concerned Enough About Password Security?

Cybersecurity remains a top-of-mind issue for businesses today, both large and small. In 2017, breaches — like that of the Equifax breach, which put the data of 145.5 million Americans at risk — showed corporations just how damaging a cyber-attack can be. But hacks don’t just affect big-name businesses; according Verizon Data Breach Report, 61 percent of breach victims in 2017 were businesses with under 1,000 employees.

The takeaway? No matter what your company size, you have to be on top of their cybersecurity game.

This is especially true given the role that human error plays in security breaches. As a recent password security study conducted by Varonis demonstrated, the majority of Americans aren’t vigilant about changing their passwords, and often remember them using tactics that aren’t recommended by cybersecurity professionals. If you don’t have strict cybersecurity policies in place, something as simple as a negligent employee could put your company at risk.

To learn more about the password habits — and consider whether it’s time to implement a password standard when you work both with your business and your client — check out the infographic from Varonis, below.

Americans and Password Security
Infographic courtesy of Varonis.com