Cybersecurity Awareness

Cyber intrusions are any unauthorized acts of criminal intent by using electronic materials such as laptops, personal computers, and wireless devices via hacks and bits of malicious code to obtain classified and unclassified information.

Suspicious Indicators


The following is a list of suspicious indicators related to network activity and cyber intrusions:
– Unauthorized system access attempts
– Unauthorized system access to or disclosure of information
– Any acts that interrupt or result in a denial of service
– Unauthorized data storage or transmission
– Unauthorized hardware and software modifications
– E-mails received from unknown senders (that include social engineering attempts such as phishing)

The following countermeasures can be taken by cleared defense contractors to guard against this collection method:
– Comply with the measures in your company’s Technology Control Plan (TCP)
– Conduct frequent computer audits
– Do not rely on firewalls to protect against all attacks
– Report intrusion attempts
– Avoid responding to any unknown request and report these requests
– Disconnect computer system temporarily in the event of a severe attack

Security Procedures and Duties Applicable to the Employee's Job

PCL employees might encounter additional security procedures and/or duties applicable to their job.

Examples include the following: 

  • Derivative Classifications – Working with classified information, you produce, extract, or summarize classified information, or apply classification markings derived from source material. 

  • North Atlantic Treaty Organization (NATO) – SIPRNET/NIPRNet are common requirements

  • Classified Meetings 

  • OPSEC – Operational Security  

  • COMSEC – Communication Security 


  • Common Access Cards 

  • Special Access Programs/ Sensitive Compartmented Information (SCI)
Annual Refresher & Insider Treat Awareness