article thumbnail

Computer Security for NGOs

Little Web Giants

Spend time as a team exploring new tools and techniques – for example set aside an hour or so on a Friday afternoon for everyone to install a password manager, or an encrypted SMS application. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

Spend time as a team exploring new tools and techniques – for example set aside an hour or so on a Friday afternoon for everyone to install a password manager, or an encrypted SMS application. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

Spend time as a team exploring new tools and techniques – for example set aside an hour or so on a Friday afternoon for everyone to install a password manager, or an encrypted SMS application. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.