Recently Updated Pages
Protecting Against Phishing: Recognizing Fake Login Pages
Summary Phishing attacks, particularly those using fake authentication pages, represent one of th...
Digital Emergency Response: 5 Critical Steps
Print this out and keep it handy for when things go wrong, and in case you’re locked out of your ...
FileVault Encryption for Mac Computers (macOS)
Mac computers include FileVault, a built-in encryption system that secures all data at rest using...
Tech Security While Crossing Borders
Planning Ahead: Before Your Trip Minimize What You Carry Leave devices at home when possible - b...
Best Practices for Preventing Unauthorized Document Capture and Access
The Reality Unfortunately, there's no foolproof technical solution to prevent screenshots. If som...
Best Practices for Safely Sharing Google Docs
These guidelines help you use Google Drive strategically, balancing collaboration needs with data...
K'lal Tech Digital Risk Assessment Tool
Go here to access K'lal Tech's custom Digital Risk Assessment Tool: https://assessment.klal.tech
Best Practices for Secure Communications
Use Encrypted Platforms Use Signal for sensitive discussions. It offers end-to-end encrypt...
Using Generative AI for Advocacy: Risks and Benefits
Summary Generative artificial intelligence (AI) refers to systems that can create human-like text...
Tips for Using Facebook and Meta Accounts Safely
1. Use Strong, Unique Passwords Don’t reuse the same password on more than one website. Make ...
Using Tresorit for file storage and editing
For organizations handling highly sensitive information where security outweighs convenience conc...
Removing Metadata from Word Documents & PDFs
What Metadata Is and Why It Matters Metadata is hidden information stored within files — like au...
Digital Security: 5 Things to Do Right Now
Security is not one-size-fits-all! The steps below are starting points you can tailor to your ind...
When Your Organization Goes Dormant or Closes: Securing Digital Assets
When an organization pauses operations or shuts down permanently, unmanaged digital accounts and ...