Advanced Search
Search Results
14 total results found
When Your Organization Goes Dormant or Closes: Securing Digital Assets
When an organization pauses operations or shuts down permanently, unmanaged digital accounts and data can become security and privacy liabilities. Sensitive files, domain names, and inactive accounts are common targets for compromise. The following checklist o...
Best Practices for Secure Communications
Use Encrypted Platforms Use Signal for sensitive discussions. It offers end-to-end encryption, minimal metadata retention, and open-source transparency . Turn on disappearing messages, registration lock, and screen lock. Secure Accounts and Device...
Using Generative AI for Advocacy: Risks and Benefits
Summary Generative artificial intelligence (AI) refers to systems that can create human-like text, images, and other content in response to prompts. This document will explain how to responsibly use tools like ChatGPT, Claude, Gemini, Copilot, and Meta AI to a...
Removing Metadata from Word Documents & PDFs
What Metadata Is and Why It Matters Metadata is hidden information stored within files — like author names, document history, comments, tracked changes, revision dates, and even location data. It can reveal sensitive details unintentionally and should always ...
Using Tresorit for file storage and editing
For organizations handling highly sensitive information where security outweighs convenience concerns, Tresorit provides privacy and security that mainstream providers cannot match. However, teams requiring extensive real-time collaboration may need to supplem...
Tips for Using Facebook and Meta Accounts Safely
1. Use Strong, Unique Passwords Don’t reuse the same password on more than one website. Make it long, using a mix of letters, numbers, and symbols. Never share your password with anyone, even if they claim to be “Meta support.” 2. Use a Password Manage...
Digital Security: 5 Things to Do Right Now
Security is not one-size-fits-all! The steps below are starting points you can tailor to your individual or organizational context, adapting for things like staff skills, available resources, risk level, and known adversaries. 1. Use a Password Manager A pas...
Groundwire Digital Risk Assessment Tool
Go here to access K'lal Tech's custom Digital Risk Assessment Tool: https://assessment.groundwireadvisors.com
Best Practices for Safely Sharing Google Docs
These guidelines help you use Google Drive strategically, balancing collaboration needs with data protection and security awareness. Adapt these practices based on your organization's risk level, document sensitivity, and compliance requirements. Before You Sh...
Best Practices for Preventing Unauthorized Document Capture and Access
The Reality Unfortunately, there's no foolproof technical solution to prevent screenshots. If someone can view a document on their screen, they can potentially capture it through: Screenshots Phone cameras Screen recording software Practical Limitations Prev...
Tech Security While Crossing Borders
Planning Ahead: Before Your Trip Minimize What You Carry Leave devices at home when possible - border agents cannot search what you don't bring Use a temporary "travel" device with minimal data loaded on it Remove sensitive information from devices you must b...
FileVault Encryption for Mac Computers (macOS)
Mac computers include FileVault, a built-in encryption system that secures all data at rest using AES-XTS encryption. How It Works On Apple Silicon and T2 Macs: FileVault uses Data Protection Class C with a volume key Encryption leverages the Secure Enclave a...
Digital Emergency Response: 5 Critical Steps
Print this out and keep it handy for when things go wrong, and in case you’re locked out of your accounts. This checklist applies to incidents like: Doxxing attacks - Your home address, phone number, or family information published online Account comprom...
Protecting Against Phishing: Recognizing Fake Login Pages
Summary Phishing attacks, particularly those using fake authentication pages, represent one of the most common and effective methods for compromising organizational and personal accounts. These attacks have become increasingly sophisticated, with fake Google, ...