You should research current digital security best practices based on your individual threat model. But for posterity (and insight into organizing training sessions), check out our materials from our Digital Security Training with ACLU DC and Georgetown Law’s Institute for Technology Law & Policy in August 2017.
See also Georgetown Law’s Institute for Technology Law & Policy’s blog post. These materials serve as learning aids only and are not legal advice. Please note some of these instructions and recommendations may be out of date.
Digital Security Training Handouts
- Mobile Phone Security
- Password Security
- Scrubbind Documents
- Secure File Transfer
- Secure Messaging, Voice, and Email
- Securing MAC OS X
- Securing Microsoft Windows
- Securely Using the Internet On-the-go
- Two-step Authentication Facebook
- Two-step Authentication Google
- Two-step Authentication Twitter
Digital Security Training Presentations
- Digital Security Training: Operational Security by Matt Mitchell
- Hook, line and sinker! How to recognize phishing and what to do by Shauna Dillavou
- Laptop & Phone Security by Alex Ulsh
- Passwords, Two Factor Authentication, HTTPS, Third Parties in 10 minutes somehow by Eric Mill