Why
This material is useful for an organisation which:
- Wants to construct a more secure communications network between its contacts;
- Sees the need for behaviour change to protect itself;
- Produces content and data that must only be known to the organisation;
- Values the security of its team and resources;
- Seeks autonomy of information exchanged between everyone.
What you can expect
A step-by-step guide on how to activate digital security strategies for integrated protection and a brief overview of how the internet functions in order to understand the pathways digital information takes, contextualizing the importance of security of information linked to concepts of surveillance and privacy. Here, you will also obtain knowledge of certain tools to construct a digital security protocol.
What you get
Knowledge
- A general step-by-step view of how to construct secure communications
Example
- How to make a plan to follow security strategies
Support tools
- Introduction to digital security and surveillance
- Model tables to map information and strategies
- KeePassXC site
- Signal encrypted chat
- Riseup VPN