As we gear up for any digital attacks, we may as well equip ourselves with the knowledge of digital safety and security. CSO and grassroots activists need to understand that their accounts can be hacked any time.
Here are some tools to mitigate digital security risks.
- Create and customize your social media policy as guidelines for responsible use of social media by CSO. These guidelines encompasses of rules for using personal social media on office assets, things to avoid doing on social media such as answering personal information in quizzes, which teams or departments are in charge of each social media account, who is in charge for coming up with a strong password and how often to change it, software updates on gadgets; recognize and steer clear of scams, assaults, and other security threats, who to contact and how to handle if there is a question about social media security.
- Use a two-factor authentication as an additional level of security for your social media accounts. Attackers have a harder time getting into someone's devices or online accounts with two-factor authentication because a victim's password alone is not enough to pass the authentication check. Therefore, this process becomes an added layer of security for your CSO accounts and your private accounts.
- Train your staff on digital security so they can recognize vulnerabilities. This training will allow employees to engage, ask questions, and understand the importance of following up on potential threats.
- Regularly check who is currently logged in to your devices. You can check this in your settings and privacy tab under “where you’re logged in.” This section is available in almost all social media channels to help you keep track of who is logged in to your account.
Digital attacks are becoming bigger threats to civil society groups, activists, and citizens, so it's important to put in place robust security measures. People and organizations can better protect democratic ideals and freedom of speech in the digital world by improving security.
Contact us for further discussion related to CSO digital security and how to stay safe from delegitimization attacks.