This Site Requires JavaScript Enabled.

The GCA Cybersecurity Toolkit for Journalists

A Resource for Independent Journalists, Watchdogs, and Small Newsrooms

Start Using
the Toolkit

The Cybersecurity Toolkit for Journalists is designed to be completed in seven steps. Start here with Step One.

Visit the
Training Portal

For more detailed training, visit the Totem Project, a free online resource in partnership with Free Press Unlimited.

Totem icon

Why Use the Toolkit

The Global Cyber Alliance (GCA) created this toolkit to empower independent journalists, watchdogs, and small newsrooms with information and tools to protect their sources and reputation. The toolkit follows best practice recommendations provided by the Center for Internet Security (CIS). The CIS recommendations are continuously updated using current threat information and expert guidance, enabling you to stay up to date on how to report the news on your terms.

Use the GCA Cybersecurity Toolkit to assess your security posture, implement free tools, find practical tips, and use free resources and guides to build trust, defend the truth, and protect your sources.

93%

of adults in the U.S. get at least some news online.

Build Trust.

Citizens need to trust that the news they read is accurate, factual, and complete. Journalists also need to have confidence in their systems.

Protect
Your Sources.

Whistleblowers and other vulnerable sources can face retribution before a journalist is able to properly verify and present their reporting.

Defend
Your Data.

Prevent your data from being used against you. Harassment especially affects minority groups, contributing to their lack of representation in the media.

Protect Your
Reputation.

Hackers can hijack social media accounts to impersonate journalists. This can lead to the spread of misinformation and damage the trust a journalist has built.

Legal Notice

GCA may provide information about third-party products or services, including security tools, videos, templates, guides, and other resources included in our cybersecurity toolkits (collectively, “Third-Party Content”). You are solely responsible for your use of Third-Party Content, and you must ensure that your use of Third-Party Content complies with all applicable laws, including applicable laws of your jurisdiction and applicable U.S. export compliance laws.  We provide Third-Party Content as a service to those interested in such content. Your dealings or correspondence with third parties and your use of or interaction with any Third-Party Content are solely between you and the third party. GCA does not control or endorse, and makes no representations or warranties regarding, any Third-Party Content, and your access to and use of such Third-Party Content is at your own risk.