The following pages and posts are tagged with
| Title | Type | Excerpt |
|---|---|---|
| Advanced Threats Triage Workflow | Page | The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network. |
| Circumvention & Anonimity tools list | Page | Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t... |
| Forensic Handling of Data on a PC | Page | The Helpline has come into possession of a personal computer with digital evidence. |
| Lightweight Security Assessment | Page | An organization is requesting assistance on digital security, but their request is not clear; An organization would like to receive help to improve their pra... |
| FAQ - Secure Backup | Page | The client has sensitive information and he is afraid of loosing them; The client is going to encrypt their device and wants to back up their data in advance... |
| Secure Email Recommendations | Page | A client needs recommendations on how to secure their email communications. |
| How to recognize spear-phishing and what to do | Page | A user at risk has received a phishing message that seems targeted. |
| Client Receives a Suspicious/Phishing Email | Page | The client has received an email with or without an attachment from a known or unknown source. |
| Recommendations on VoIP/video chat tools | Page | Client uses Skype, Google Hangouts, or other commercial services for sensitive voice/video chat. |