This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

Step 6

Encrypt Your Data

Use the tools here to encrypt your data and secure your communications so that vital information is not as easily compromised.

Imagine you’re a political reporter during an election cycle. It’s a stressful time though the finish line is in sight. Things are getting juicy in the campaign, though. The long shadow of a messy divorce is coming back to haunt one candidate, and it’s looking like they’re going to lose. Meanwhile, on an anonymous tip, you learn that the other candidate may have been redirecting campaign funds to pay for his yacht. You suspect the divorce hullabaloo might have been raised to distract from some pretty serious corruption.

At a press conference, you ask the allegedly embezzling candidate some pointed questions about the yacht. The politician snaps back, accusing you of having financial troubles too, and claims you can’t report on the election objectively because of an affinity for his opponent. What he says is true, you have been having financial trouble, though you’ve gone out of your way to keep it private. You’ve never spoken out loud about it, even to your closest friends. There are just some documents you’ve had to exchange via email with a family member.

How could the politician have known? And if he knows about your financial troubles, does he know that you’re on to his corrupt dealings too?

If your email and documents had been encrypted, it would have been less likely that bad actors could have intercepted them. In order to keep your work and life discrete, it makes sense to encrypt everything.

In 2017, many American journalists were afraid that leaks of seemingly benign information could be used to intimidate people into revealing more information. When some political office holders called for state investigations of journalistic activity, everything they shared and communicated could have been subjected to scrutiny. Even newsrooms with encryption, though, need to stay vigilant from vulnerabilities like phishing, as happened to one British investigative outlet in 2019.

Encrypt your data, and use secure communications for an added layer of peace of mind.

6.1 Encrypt Your Data

Narrow your search by selecting your OS
Project Galileo
Type
2
Level
0h 30min
Time

Project Galileo: Cloudflare SSL

Use this tool to encrypt Internet traffic and verify server identity.

Type
1
Level
0h 15min
Time

BitLocker for Microsoft Windows

Use this tool to encrypt your Microsoft Windows systems.

Type
1
Level
0h 10min
Time

FileVault for Mac

Use this tool to encrypt your Mac systems.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Recently Added Encrypt Email image

How to Encrypt Email

Email encryption is the process of disguising the content of your email messages to protect them from being read by unwanted...

Read More
GCA logo

GCA Cybersecurity Toolkit Workshop

This GCA workshop provides real-world scenarios and walks participants through the implementation of recommendations through...

Read More

Understanding Cyber Risk for Journalists

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More