These open-source resources are freely available to the public and can be used for self-learning, workshops, or organizational trainings. The collection includes materials focused on basic digital security hygiene, secure communications practices, and introductory threat modeling, helping users understand risks and make informed decisions in their specific contexts. Most resources are provided in accessible PDF and DOC formats, making them easy to adapt, translate, and incorporate into a wide range of educational and operational contexts.

<aside> <img src="/icons/reorder_red.svg" alt="/icons/reorder_red.svg" width="40px" />

Table of Contents

  1. Seeds of Security
  2. Digital Security Policy Template
  3. Policy Creation Questionnaire
  4. SIM Card Locking Guide
  5. Digital Hygiene Anti-Doxxing Social Media Precautions Presentation
  6. Encrypted Storage Providers Comparison Chart
  7. Privacy Tips for AI Users
  8. Digital Security Practices when Crossing Borders
  9. How to Make Signal Super Safe and Secure
  10. Signal User Guide, 2025
  11. WhatsApp Privacy & Security Settings Guide, 2025
  12. Data Classification Guidance
  13. Threat & Risk Assessment Modeling

Third-Party Resources

</aside>


  1. A philosophical starting point for tending to your security and privacy garden.

    Seeds of Security.pdf

  2. This policy templates covers best practices in digital security which must be observed, as well as detailed information on various digital security protocols which must be followed to maintain the confidentiality, integrity and functionality of the organization. It is ready for you to tune and customize for your needs!

    Digital Security Policy - TEMPLATE.docx

  3. Use this template to get started documenting. It may not be comprehensive of the tools, policies or procedures unique to your organization, so add questions or policies you deem necessary. You may also choose to create a survey or editable form format for easier completion.

    Policy-Creation-Questionnaire--2025.doc

  4. Learn how to lock your SIM card to stop an attacker from taking over or “cloning” your mobile phone number.

    SIM-Card-Locking.pdf

  5. Presentation on how you live online and off is being tracked, and some steps you can take to remedy that.

    Digital Hygiene Anti-Doxxing and Social Media Precautions.pdf

  6. Comparison chart of VeraCrypt, Proton, CryptPad, Tresorit, and NordLocker

    Encrypted Storage Comparison 2025.pdf

  7. Some privacy tips, as best as can be done, for users of generative AI and LLM services and tools.

    Poster_-_Privacy_Tips_for_AI_Users.pdf

  8. Taking an international trip soon, and worried about what steps you should take to protect yourself and your devices? This guide is for you!

    Digital Security Practices when Crossing Borders.pdf