Skip to main content

Recently Updated Pages

Using Phones in High-Risk Public Environments

Protests and Activism

Phones are high-risk tools in volatile settings. The most effective mitigation is not better apps...

Updated 2 weeks ago by Josh

Comprehensive Incident Response Plan

General Digital Security Resources

[NAME OF ORGANIZATION] Effective Date: [Date] Policy Owner: [Insert Name] Last Updated: [Date] Re...

Updated 2 weeks ago by Josh

Moving Sensitive Communications to Signal or WhatsApp

Social Media and Communications

Moving Sensitive Communications to Secure Messaging Email and workplace chat platforms like Slack...

Updated 1 month ago by Josh

Secure Document Sharing & Retention Framework

Document Storage and Sharing

This framework provides actionable guidance for managing document sharing, permissions, and offbo...

Updated 1 month ago by Josh

Groundwire Digital Risk Assessment Tool

Digital Risk Assessment Tools

Go here to access K'lal Tech's custom Digital Risk Assessment Tool: https://assessment.groundwire...

Updated 1 month ago by Josh

Protecting Against Phishing: Recognizing Fake Login Pages

Phishing and Authentication Attacks

Summary Phishing attacks, particularly those using fake authentication pages, represent one of th...

Updated 1 month ago by Josh

Digital Emergency Response: 5 Critical Steps

General Digital Security Resources

Print this out and keep it handy for when things go wrong, and in case you’re locked out of your ...

Updated 3 months ago by Josh

FileVault Encryption for Mac Computers (macOS)

Hardware Security

Mac computers include FileVault, a built-in encryption system that secures all data at rest using...

Updated 3 months ago by Josh

Tech Security While Crossing Borders

Travel

Planning Ahead: Before Your Trip Minimize What You Carry Leave devices at home when possible - b...

Updated 3 months ago by Josh

Best Practices for Preventing Unauthorized Document Capture and Access

Document Storage and Sharing

The Reality Unfortunately, there's no foolproof technical solution to prevent screenshots. If som...

Updated 3 months ago by Josh

Best Practices for Safely Sharing Google Docs

Document Storage and Sharing

These guidelines help you use Google Drive strategically, balancing collaboration needs with data...

Updated 3 months ago by Josh

Best Practices for Secure Communications

Social Media and Communications

Use Encrypted Platforms Use Signal for sensitive discussions. It offers end-to-end encrypt...

Updated 3 months ago by Josh

Using Generative AI for Advocacy: Risks and Benefits

AI

Summary Generative artificial intelligence (AI) refers to systems that can create human-like text...

Updated 3 months ago by Josh

Tips for Using Facebook and Meta Accounts Safely

Social Media and Communications

1. Use Strong, Unique Passwords Don’t reuse the same password on more than one website. Make ...

Updated 3 months ago by Josh

Using Tresorit for file storage and editing

Document Storage and Sharing

For organizations handling highly sensitive information where security outweighs convenience conc...

Updated 3 months ago by Josh

Removing Metadata from Word Documents & PDFs

Document Storage and Sharing

What Metadata Is and Why It Matters Metadata is hidden information stored within files — like au...

Updated 3 months ago by Josh

Digital Security: 5 Things to Do Right Now

General Digital Security Resources

Security is not one-size-fits-all! The steps below are starting points you can tailor to your ind...

Updated 3 months ago by Josh

When Your Organization Goes Dormant or Closes: Securing Digital Assets

General Digital Security Resources

When an organization pauses operations or shuts down permanently, unmanaged digital accounts and ...

Updated 3 months ago by Josh