The following pages and posts are tagged with
Title | Type | Excerpt |
---|---|---|
Advanced Threats Triage Workflow | Page | The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network. |
Circumvention & Anonimity tools list | Page | Trouble opening websites/social media; the website of a client has been blocked and they would like to provide visitors with tools to circumvent the block; t... |
Forensic Handling of Data on a PC | Page | The Helpline has come into possession of a personal computer with digital evidence. |
Lightweight Security Assessment | Page | An organization is requesting assistance on digital security, but their request is not clear; An organization would like to receive help to improve their pra... |
FAQ - Secure Backup | Page | The client has sensitive information and he is afraid of loosing them; The client is going to encrypt their device and wants to back up their data in advance... |
Secure Email Recommendations | Page | A client needs recommendations on how to secure their email communications. |
How to recognize spear-phishing and what to do | Page | A user at risk has received a phishing message that seems targeted. |
Client Receives a Suspicious/Phishing Email | Page | The client has received an email with or without an attachment from a known or unknown source. |
Recommendations on VoIP/video chat tools | Page | Client uses Skype, Google Hangouts, or other commercial services for sensitive voice/video chat. |