Skip to main content

Recently Updated Pages

Protecting Against Phishing: Recognizing Fake Login Pages

Phishing and Authentication Attacks

Summary Phishing attacks, particularly those using fake authentication pages, represent one of th...

Updated 8 hours ago by Josh

Digital Emergency Response: 5 Critical Steps

General Digital Security Resources

Print this out and keep it handy for when things go wrong, and in case you’re locked out of your ...

Updated 1 month ago by Josh

FileVault Encryption for Mac Computers (macOS)

Hardware Security

Mac computers include FileVault, a built-in encryption system that secures all data at rest using...

Updated 1 month ago by Josh

Tech Security While Crossing Borders

Travel

Planning Ahead: Before Your Trip Minimize What You Carry Leave devices at home when possible - b...

Updated 1 month ago by Josh

Best Practices for Preventing Unauthorized Document Capture and Access

Document Storage and Sharing

The Reality Unfortunately, there's no foolproof technical solution to prevent screenshots. If som...

Updated 1 month ago by Josh

Best Practices for Safely Sharing Google Docs

Document Storage and Sharing

These guidelines help you use Google Drive strategically, balancing collaboration needs with data...

Updated 1 month ago by Josh

K'lal Tech Digital Risk Assessment Tool

Digital Risk Assessment Tools

Go here to access K'lal Tech's custom Digital Risk Assessment Tool: https://assessment.klal.tech

Updated 1 month ago by Josh

Best Practices for Secure Communications

Social Media and Communications

Use Encrypted Platforms Use Signal for sensitive discussions. It offers end-to-end encrypt...

Updated 1 month ago by Josh

Using Generative AI for Advocacy: Risks and Benefits

AI

Summary Generative artificial intelligence (AI) refers to systems that can create human-like text...

Updated 1 month ago by Josh

Tips for Using Facebook and Meta Accounts Safely

Social Media and Communications

1. Use Strong, Unique Passwords Don’t reuse the same password on more than one website. Make ...

Updated 1 month ago by Josh

Using Tresorit for file storage and editing

Document Storage and Sharing

For organizations handling highly sensitive information where security outweighs convenience conc...

Updated 1 month ago by Josh

Removing Metadata from Word Documents & PDFs

Document Storage and Sharing

What Metadata Is and Why It Matters Metadata is hidden information stored within files — like au...

Updated 1 month ago by Josh

Digital Security: 5 Things to Do Right Now

General Digital Security Resources

Security is not one-size-fits-all! The steps below are starting points you can tailor to your ind...

Updated 1 month ago by Josh

When Your Organization Goes Dormant or Closes: Securing Digital Assets

General Digital Security Resources

When an organization pauses operations or shuts down permanently, unmanaged digital accounts and ...

Updated 1 month ago by Josh