The goal is to construct a picture-in some ways no more than an educated guess-of what you’re up against. This is called threat modeling and is the first step in any security analysis. This work begins with thinking through what it is you have to protect, and from whom. But assuming that everyone you are working with is already up to speed on basic computer security practice, there’s a lot more you can do to provide security for a specific, sensitive story. If one of your colleagues uses weak passwords or clicks on a phishing link, more sophisticated efforts are wasted. In part one of this series, we covered the digital security precautions that everyone in news organizations should take. ![]() If you know that your work as a journalist will involve specific risks, you need a specific security plan.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |