What’s the first step in securing our organization’s technology? Topics:Assessment, Digital Self-Defense, Network, Office System, Troubleshooting
How do we use the “cloud” securely? Topics:Data Storage, Digital Self-Defense, Encryption, Privacy \ Tools:Cloud Storage
Should I use a password manager? Topics:Assessment, Digital Self-Defense, Encryption, Password Managers, Privacy \ Tools:Password Managers
Can I make my cellphone secure? Topics:Digital Self-Defense, Location Tracking, Privacy, Surveillance \ Tools:Encryption, Signal, Smart Phones, SMS / Text Messaging
What protocols/programs should our organization and its members protect? Topics:Data Storage, Malware & Spyware, Privacy, Surveillance \ Tools:Cloud Storage, CRM-Databases, Email, Encryption, Password Managers, Smart Phones
How should I respond to an online attack? Topics:Assessment, Digital Self-Defense, Harassment, Incident Response \ Tools:Encryption, Social Media