Edit me

The following pages and posts are tagged with

TitleTypeExcerpt
Advanced Threats Triage Workflow Page The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network.
Circumvention & Anonimity tools list Page Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t...
Forensic Handling of Data on a PC Page The Helpline has come into possession of a personal computer with digital evidence.
Lightweight Security Assessment Page An organization is requesting assistance on digital security, but their request is not clear; An organization would like to receive help to improve their pra...
FAQ - Secure Backup Page The client has sensitive information and he is afraid of loosing them; The client is going to encrypt their device and wants to back up their data in advance...
Secure Email Recommendations Page A client needs recommendations on how to secure their email communications.
How to recognize spear-phishing and what to do Page A user at risk has received a phishing message that seems targeted.
Client Receives a Suspicious/Phishing Email Page The client has received an email with or without an attachment from a known or unknown source.
Recommendations on VoIP/video chat tools Page Client uses Skype, Google Hangouts, or other commercial services for sensitive voice/video chat.