Recently Updated Pages
Using Phones in High-Risk Public Environments
Phones are high-risk tools in volatile settings. The most effective mitigation is not better apps...
Comprehensive Incident Response Plan
[NAME OF ORGANIZATION] Effective Date: [Date] Policy Owner: [Insert Name] Last Updated: [Date] Re...
Moving Sensitive Communications to Signal or WhatsApp
Moving Sensitive Communications to Secure Messaging Email and workplace chat platforms like Slack...
Secure Document Sharing & Retention Framework
This framework provides actionable guidance for managing document sharing, permissions, and offbo...
Groundwire Digital Risk Assessment Tool
Go here to access K'lal Tech's custom Digital Risk Assessment Tool: https://assessment.groundwire...
Protecting Against Phishing: Recognizing Fake Login Pages
Summary Phishing attacks, particularly those using fake authentication pages, represent one of th...
Digital Emergency Response: 5 Critical Steps
Print this out and keep it handy for when things go wrong, and in case you’re locked out of your ...
FileVault Encryption for Mac Computers (macOS)
Mac computers include FileVault, a built-in encryption system that secures all data at rest using...
Tech Security While Crossing Borders
Planning Ahead: Before Your Trip Minimize What You Carry Leave devices at home when possible - b...
Best Practices for Preventing Unauthorized Document Capture and Access
The Reality Unfortunately, there's no foolproof technical solution to prevent screenshots. If som...
Best Practices for Safely Sharing Google Docs
These guidelines help you use Google Drive strategically, balancing collaboration needs with data...
Best Practices for Secure Communications
Use Encrypted Platforms Use Signal for sensitive discussions. It offers end-to-end encrypt...
Using Generative AI for Advocacy: Risks and Benefits
Summary Generative artificial intelligence (AI) refers to systems that can create human-like text...
Tips for Using Facebook and Meta Accounts Safely
1. Use Strong, Unique Passwords Don’t reuse the same password on more than one website. Make ...
Using Tresorit for file storage and editing
For organizations handling highly sensitive information where security outweighs convenience conc...
Removing Metadata from Word Documents & PDFs
What Metadata Is and Why It Matters Metadata is hidden information stored within files — like au...
Digital Security: 5 Things to Do Right Now
Security is not one-size-fits-all! The steps below are starting points you can tailor to your ind...
When Your Organization Goes Dormant or Closes: Securing Digital Assets
When an organization pauses operations or shuts down permanently, unmanaged digital accounts and ...