Where does your team store its two-factor authentication codes?

The choice between storing two-factor authentication codes on your device, versus a remote service in the cloud comes with some usability and security trade-offs.

How journalists can work from home securely

Both the newsroom and individual journalists must make some changes to work from home securely.

How reporters’ emails get got: Case studies in legal requests and hacking

Before potentially burning a source or tipping off a target before you're ready, journalists should know the privacy and security constraints of email — who can see your emails, and when?

Security keys, meet the real world

One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our security training team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.

Newsrooms, let's talk about Office 365

Once upon a time, Microsoft Office provided a small suite of applications on your computer, including Word for writing, Excel for spreadsheets, and PowerPoint for presentations. But increasingly, modern newsrooms use Office 365 to access these tools over the web, alongside remote storage and team management software. While working on the web offers obvious advantages, many reporters also wonder about the privacy and security of this data. What about our most sensitive, unpublished details when reporting? What can Microsoft see?

How to shop for a journalist: A security gift-giving guide

Sometimes I need gifts for my journalist friends. Journalists don’t typically treat themselves to gadgets and services that will make their jobs safer and easier, but maybe you can treat them instead.

Newsrooms, let’s talk about G Suite

If you work in a newsroom, there’s a good chance you work with colleagues on Google Docs, Slides, Sheets, and more. G Suite software is simple and powerful. But anyone working in a newsroom has probably asked themselves: What can Google see? What about our most sensitive conversations and documents? What about documents that concern our own unreleased reporting, or information on our sources?

Leaking on the clock: What your sources need to know

Last week, Eric Trump tweeted a screenshot of an email that circulated through the Trump Organization by Washington Post reporter David Fahrenthold. Although the tweet sensationalized Fahrenholt’s emails, it should fall short of qualifying for reality TV levels of drama, since reporters do this sort of thing all the time. But are there other considerations to take in mind when reaching out to sources in their workplaces?

Journalists, how private are your Slack messages really?

It's time to rethink your privacy on Slack.

The story inside your software updates

If your web browser is asking you to install software updates, it may also be asking you to protect itself from getting hacked.

Categories