Government of Canada Company Cyber Security Posture

canada.ca

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you are interested in joining our diverse and innovative team, visit www.jobs.gc.ca for information and opportunities. Terms: https://www.canada.ca/en/transparency/terms.html Le gouvernement du Canada œuvre au nom des Canadiens, tant au pays qu’à l’étranger. Consultez le site www.canada.ca pour en savoir plus. Impartiale et professionnelle, la fonction publique du Canada fait partie de l’élite mondiale. Bon nombre de ses ministères et organismes figurent parmi les 100 meilleurs employeurs du pays année après année. Vous aimeriez intégrer notre équipe diversifiée et innovante? Rendez-vous au www.emplois.gc.ca pour obtenir des informations et connaître les possibilités qui s’offrent à vous. Avis : https://www.canada.ca/fr/transparence/avis.html

GC Company Details

Linkedin ID:

government-of-canada

Employees number:

162692 employees

Number of followers:

858448.0

NAICS:

922

Industry Type:

Government Administration

Homepage:

canada.ca

IP Addresses:

Scan still pending

Company ID:

GOV_3007032

Scan Status:

In-progress

AI scoreGC Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Government of Canada Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Government of Canada Company Cyber Security News & History

Past Incidents
6
Attack Types
3
EntityTypeSeverityImpactSeenUrl IDDetailsView
Canada Revenue Agency - Agence du revenu du CanadaBreach85406/2018CAN17246822Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Canada Revenue Agency logs 2,338 privacy breaches in just under 2 years. The personal, confidential information of over 80,000 individual Canadians held by the Canada Revenue Agency may have been accessed without authorization over the last 21 months. But only a handful affected a large number of Canadians.

Public Services and Procurement CanadaBreach60309/2018PUB110311022Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: A significant data breach happened in the federal government after a device was stolen from Public Services and Procurement Canada. PSPC is Infrastructure Canada’s service provider for pay, pension and benefits. All 227 employees were affected are at Infrastructure Canada No banking or social insurance information was affected. Name, person record identifier (PRI), date of birth, home address and salary range may have been compromised.

Canada Border Services Agency | Agence des services frontaliers du CanadaBreach80410/2022CAN206221122Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Canada Border Services Agency suffered a data breach incident after a contractor led to the unauthorised access of up to 1.38 million licence plates and related information.  The investigation found that the contract lacked clauses with respect to security safeguards, including for the protection and retention of personal information. Bad actors were able to break into the third-party contractors’ systems through an unpatched and decommissioned server, where they were able to access, copy, and remove files from the network, before posting some of the data on the dark web. The breach exposed around 9,000 licence plate photos of travellers crossing into Canada from the border crossing in Cornwall, Ontario.

Government of CanadaCyber Attack100606/2015GOV192330422Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: Several Canadian government websites and servers were targeted in a cyberattack by the hacking group Anonymous. The attack affected several websites for government services, including canada.ca, as well as the site of Canada’s spy agency, the Canadian Security Intelligence Service (CSIS). The attack was aimed to show their retaliation for a new anti-terrorism law passed by Canada’s politicians.

Public Services and Procurement CanadaCyber Attack85408/2022PUB2215251022Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A device was stolen from Public Services and Procurement Canada. PSPC is Infrastructure Canada’s service provider for pay, pension and benefits. All 227 employees affected are at Infrastructure Canada. The device in question was stolen on Aug 20 and affected employees were informed on Sept 7. No banking or social insurance information was affected. Name, person record identifier (PRI), date of birth, home address and salary range have been compromised. Ottawa police have been made aware of the incident.

Government of CanadaData Leak60308/2018GOV12181122Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The governments of Canada was exposed to the entire internet details of software bugs and security plans, as well as passwords for servers, official internet domains, conference calls, and an event-planning system by misconfiguring pages on Trello, a project management website. 25 Canadian government trello boards had sensitive information, such as remote file access, or FTP, credentials, and login details for the Eventbrite event-planning platform. The government of Canada said, Departments and agencies of the Government of Canada must apply adequate security controls to protect their users, information, and assets. Employees are being reminded of their obligation never to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service.

Government of Canada Company Subsidiaries

SubsidiaryImage

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you are interested in joining our diverse and innovative team, visit www.jobs.gc.ca for information and opportunities. Terms: https://www.canada.ca/en/transparency/terms.html Le gouvernement du Canada œuvre au nom des Canadiens, tant au pays qu’à l’étranger. Consultez le site www.canada.ca pour en savoir plus. Impartiale et professionnelle, la fonction publique du Canada fait partie de l’élite mondiale. Bon nombre de ses ministères et organismes figurent parmi les 100 meilleurs employeurs du pays année après année. Vous aimeriez intégrer notre équipe diversifiée et innovante? Rendez-vous au www.emplois.gc.ca pour obtenir des informations et connaître les possibilités qui s’offrent à vous. Avis : https://www.canada.ca/fr/transparence/avis.html

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=government-of-canada' -H 'apikey: YOUR_API_KEY_HERE'
newsone

GC Cyber Security News

2025-03-14T07:00:00.000Z
Canadian CPCSC program rolls out progressive cybersecurity standards to bolster national defense resilience

The Canadian government has introduced the Canadian Program for Cyber Security Certification (CPCSC) to strengthen its cybersecurity posture.

2025-03-31T07:00:00.000Z
Canadian CMMC? Canada Proposes Cyber Compliance Regime for Canadian Defense Suppliers

On March 12, 2025, the Government of Canada announced plans to launch the Canadian Program for Cyber Security Certification (CPCSC).

2025-02-17T08:00:00.000Z
Federal government announces latest National Cyber Security Strategy | Canada | Global law firm

On February 6, the Government of Canada announced its latest National Cyber Security Strategy (the NCSS), detailing the federal government's ...

2024-11-18T08:00:00.000Z
BlackBerry Welcomes Canada’s Support To Enhance Cyber Resilience in Southeast Asia

At the APEC Leaders' Summit, BlackBerry expressed its gratitude for the Government of Canada's announcement to invest $3.9 million (CAD) in ...

2025-06-30T18:05:13.000Z
Canada suspends Hikvision operations over national security concerns

Canada on Friday ordered Chinese video surveillance company Hikvision to end its operations in the country after a government review found ...

2025-04-16T07:00:00.000Z
An IT Policy Playbook for Canada

The Canadian economy is shifting faster than its institutions are. This playbook lays out an agenda to address what Canada must fix, build, ...

2025-02-10T08:00:00.000Z
Trade war or not, Canada will keep working with the U.S. on cybersecurity

Critical systems of both countries at risk if they don't co-operate, says new head of cyber centre.

2024-08-26T07:00:00.000Z
AI and Cybersecurity: Protecting Government Data to Build Public Confidence

Artificial Intelligence (AI) emerges as a powerful tool in this ongoing battle, offering innovative solutions to fortify cybersecurity measures ...

2025-06-04T07:00:00.000Z
Microsoft offers to boost European governments' cybersecurity for free

Microsoft tracks any malicious use of AI models it releases and prevents known cybercriminals from using its AI products. AI-driven deepfakes ...

similarCompanies

GC Similar Companies

CNPq - Conselho Nacional de Desenvolvimento Científico e Tecnológico

O Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq), agência do Ministério da Ciência, Tecnologia e Inovação (MCTI), tem como principais atribuições fomentar a pesquisa científica e tecnológica e incentivar a formação de pesquisadores brasileiros. Criado em 1951, desempenha pap

State of Minnesota

Minnesota State Government is the third largest employer in the state of Minnesota, employing over 50,000 diverse and talented employees in more than 100 state agencies, boards, commissions, colleges, and universities. Our workplaces can be found across the state in 86 out of 87 Minnesota counties a

Council Careers Victoria

Victorian local government jobs offer opportunities for people with diverse skills. The sector delivers more than 100 services and employs staff in the areas of health and community care, corporate and business support, engineering, planning and community development, and environment and emergency m

Cebu City Government

Cebu City is located on the central eastern part of Cebu Province, an island at the center of the Visayas in Southern Philippines. As defined by the Bureau of Land Location Monument (BLLM) No. 1, Cebu Cadastral Survey, it is 10 degrees 17 minutes North Latitude and 123 degrees 54 minutes East Longit

West Virginia Division of Personnel

Our mission is to provide personnel management programs to support State agencies in employing and retaining individuals of the highest ability and integrity to provide efficient and effective governmental services for the citizens of West Virginia. We help the state workforce serve the people of We

Region Stockholm

Är du beredd att tänka nytt och hitta framtidens lösningar? För vårt framtida uppdrag behöver vi medarbetare med hög kompetens, stort engagemang och som strävar efter ständig förbättring. Vid din sida kan du få engagerade kollegor inom hundratals kvalificerade yrken – ekonomer, sjuksköterskor, ju

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GC CyberSecurity History Information

How many cyber incidents has GC faced?

Total Incidents: According to Rankiteo, GC has faced 6 incidents in the past.

What types of cybersecurity incidents have occurred at GC?

Incident Types: The types of cybersecurity incidents that have occurred incidents Data Leak, Cyber Attack and Breach.

How does GC detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Employees reminded of their obligation not to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service. and law enforcement notified with Ottawa Police.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Canada Border Services Agency Data Breach

Description: Canada Border Services Agency suffered a data breach incident after a contractor led to the unauthorised access of up to 1.38 million licence plates and related information.

Type: Data Breach

Attack Vector: Unpatched and decommissioned server

Vulnerability Exploited: Lack of security safeguards in the contract

Threat Actor: Unspecified bad actors

Incident : Data Exposure

Title: Canadian Government Data Exposure via Trello

Description: The government of Canada exposed sensitive information including software bugs, security plans, server passwords, official internet domains, conference calls, and event-planning system details due to misconfigured Trello boards.

Type: Data Exposure

Attack Vector: Misconfiguration

Vulnerability Exploited: Misconfigured third-party service

Incident : Data Breach

Title: Data Breach at Infrastructure Canada

Description: A significant data breach happened in the federal government after a device was stolen from Public Services and Procurement Canada (PSPC). PSPC is Infrastructure Canada’s service provider for pay, pension, and benefits. All 227 employees were affected at Infrastructure Canada. No banking or social insurance information was affected. Name, person record identifier (PRI), date of birth, home address, and salary range may have been compromised.

Type: Data Breach

Attack Vector: Device Theft

Incident : Data Breach

Title: Device Theft at Public Services and Procurement Canada

Description: A device was stolen from Public Services and Procurement Canada, compromising personal information of 227 employees at Infrastructure Canada.

Date Detected: 2023-08-20

Date Publicly Disclosed: 2023-09-07

Type: Data Breach

Attack Vector: Physical Theft

Incident : Data Breach

Title: Canada Revenue Agency Privacy Breaches

Description: The personal, confidential information of over 80,000 individual Canadians held by the Canada Revenue Agency may have been accessed without authorization over the last 21 months.

Type: Data Breach

Incident : Cyberattack

Title: Cyberattack on Canadian Government Websites

Description: Several Canadian government websites and servers were targeted in a cyberattack by the hacking group Anonymous. The attack affected several websites for government services, including canada.ca, as well as the site of Canada’s spy agency, the Canadian Security Intelligence Service (CSIS). The attack was aimed to show their retaliation for a new anti-terrorism law passed by Canada’s politicians.

Type: Cyberattack

Threat Actor: Anonymous

Motivation: Retaliation for a new anti-terrorism law

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unpatched and decommissioned server.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach CAN206221122

Data Compromised: Licence plates, Related information

Incident : Data Exposure GOV12181122

Data Compromised: software bugs, security plans, server passwords, official internet domains, conference calls, event-planning system details

Systems Affected: Trello boards

Incident : Data Breach PUB110311022

Data Compromised: Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range

Incident : Data Breach PUB2215251022

Data Compromised: Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range

Incident : Data Breach CAN17246822

Data Compromised: Personal, Confidential

Incident : Cyberattack GOV192330422

Systems Affected: canada.ca, CSIS website

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Licence plates, Related information, software bugs, security plans, server passwords, official internet domains, conference calls, event-planning system details, Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, Personal Information, Personal and Confidential.

Which entities were affected by each incident?

Incident : Data Breach CAN206221122

Entity Type: Government Agency

Industry: Government

Location: Canada

Incident : Data Exposure GOV12181122

Entity Type: Government

Industry: Public Sector

Location: Canada

Incident : Data Breach PUB110311022

Entity Type: Government Agency

Industry: Government

Size: 227 employees

Incident : Data Breach PUB2215251022

Entity Type: Government Agency

Industry: Public Services

Location: Canada

Size: 227 employees affected

Incident : Data Breach CAN17246822

Entity Type: Government

Industry: Public Sector

Location: Canada

Customers Affected: 80000

Incident : Cyberattack GOV192330422

Entity Type: Government

Industry: Public Sector

Location: Canada

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Exposure GOV12181122

Remediation Measures: Employees reminded of their obligation not to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service.

Incident : Data Breach PUB2215251022

Law Enforcement Notified: Ottawa Police

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach CAN206221122

Type of Data Compromised: Licence plates, Related information

Number of Records Exposed: 1.38 million

Data Exfiltration: Yes

Personally Identifiable Information: Licence plate photos

Incident : Data Exposure GOV12181122

Type of Data Compromised: software bugs, security plans, server passwords, official internet domains, conference calls, event-planning system details

Sensitivity of Data: High

Incident : Data Breach PUB110311022

Type of Data Compromised: Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range

Number of Records Exposed: 227

Sensitivity of Data: High

Personally Identifiable Information: Name, Person Record Identifier (PRI), Date of Birth, Home Address

Incident : Data Breach PUB2215251022

Type of Data Compromised: Personal Information

Number of Records Exposed: 227

Sensitivity of Data: Medium

Personally Identifiable Information: Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range

Incident : Data Breach CAN17246822

Type of Data Compromised: Personal, Confidential

Number of Records Exposed: 80000

Sensitivity of Data: High

Personally Identifiable Information: True

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Employees reminded of their obligation not to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service..

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Data Breach CAN206221122

Lessons Learned: Ensure contracts include security safeguards for the protection and retention of personal information.

Incident : Data Exposure GOV12181122

Lessons Learned: Importance of applying adequate security controls to protect information and assets, and the need to avoid using unauthorized digital tools for sensitive information.

What recommendations were made to prevent future incidents?

Incident : Data Exposure GOV12181122

Recommendations: Ensure that all employees are trained on proper handling of sensitive information and that only authorized tools are used for communication and storage.

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are Ensure contracts include security safeguards for the protection and retention of personal information.Importance of applying adequate security controls to protect information and assets, and the need to avoid using unauthorized digital tools for sensitive information.

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Ensure that all employees are trained on proper handling of sensitive information and that only authorized tools are used for communication and storage..

References

Where can I find more information about each incident?

Incident : Data Breach CAN17246822

Source: Public Disclosure

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Public Disclosure.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach CAN206221122

Entry Point: Unpatched and decommissioned server

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach CAN206221122

Root Causes: Lack of security safeguards in the contract; Unpatched and decommissioned server

Incident : Data Exposure GOV12181122

Root Causes: Misconfiguration of Trello boards leading to exposure of sensitive information.

Corrective Actions: Remind employees of their obligation not to communicate or store sensitive information on unauthorized digital tools.

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Remind employees of their obligation not to communicate or store sensitive information on unauthorized digital tools..

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Unspecified bad actors and Anonymous.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2023-08-20.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-09-07.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Licence plates, Related information, software bugs, security plans, server passwords, official internet domains, conference calls, event-planning system details, Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, Personal and Confidential.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Trello boards and canada.ca, CSIS website.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Licence plates, Related information, software bugs, security plans, server passwords, official internet domains, conference calls, event-planning system details, Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, Personal and Confidential.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.4M.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Ensure contracts include security safeguards for the protection and retention of personal information., Importance of applying adequate security controls to protect information and assets, and the need to avoid using unauthorized digital tools for sensitive information.

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Ensure that all employees are trained on proper handling of sensitive information and that only authorized tools are used for communication and storage..

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Public Disclosure.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unpatched and decommissioned server.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Lack of security safeguards in the contract; Unpatched and decommissioned server, Misconfiguration of Trello boards leading to exposure of sensitive information..

What was the most significant corrective action taken based on post-incident analysis?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Remind employees of their obligation not to communicate or store sensitive information on unauthorized digital tools..

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge