Step 6
Encrypt Your Data
Use the tools here to encrypt your data and secure your communications so that vital information is not as easily compromised.
How could the politician have known? And if he knows about your financial troubles, does he know that you’re on to his corrupt dealings too?
If your email and documents had been encrypted, it would have been less likely that bad actors could have intercepted them. In order to keep your work and life discrete, it makes sense to encrypt everything.
In 2017, many American journalists were afraid that leaks of seemingly benign information could be used to intimidate people into revealing more information. When some political office holders called for state investigations of journalistic activity, everything they shared and communicated could have been subjected to scrutiny. Even newsrooms with encryption, though, need to stay vigilant from vulnerabilities like phishing, as happened to one British investigative outlet in 2019.
Encrypt your data, and use secure communications for an added layer of peace of mind.
Use this tool to encrypt Internet traffic and verify server identity.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
Email encryption is the process of disguising the content of your email messages to protect them from being read by unwanted...
This GCA workshop provides real-world scenarios and walks participants through the implementation of recommendations through...
GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/