These open-source resources are freely available to the public and can be used for self-learning, workshops, or organizational trainings. The collection includes materials focused on basic digital security hygiene, secure communications practices, and introductory threat modeling, helping users understand risks and make informed decisions in their specific contexts. Most resources are provided in accessible PDF and DOC formats, making them easy to adapt, translate, and incorporate into a wide range of educational and operational contexts.
<aside> <img src="/icons/reorder_red.svg" alt="/icons/reorder_red.svg" width="40px" />
Third-Party Resources
</aside>
A philosophical starting point for tending to your security and privacy garden.
This policy templates covers best practices in digital security which must be observed, as well as detailed information on various digital security protocols which must be followed to maintain the confidentiality, integrity and functionality of the organization. It is ready for you to tune and customize for your needs!
Use this template to get started documenting. It may not be comprehensive of the tools, policies or procedures unique to your organization, so add questions or policies you deem necessary. You may also choose to create a survey or editable form format for easier completion.
Learn how to lock your SIM card to stop an attacker from taking over or “cloning” your mobile phone number.
Presentation on how you live online and off is being tracked, and some steps you can take to remedy that.
Digital Hygiene Anti-Doxxing and Social Media Precautions.pdf
Comparison chart of VeraCrypt, Proton, CryptPad, Tresorit, and NordLocker
Some privacy tips, as best as can be done, for users of generative AI and LLM services and tools.
Taking an international trip soon, and worried about what steps you should take to protect yourself and your devices? This guide is for you!