Learn
We have learned so much about digital security as we have built Digital Defense Fund, and we are so excited to share what we’ve learned with you! We truly believe that anyone can become a digital security champion, confident in protecting yourself and your community from the most common digital threats. Whether you’re looking for a training or activity to share with your network, or 101 materials to start your journey, this is the place for you!
Slide Decks
Account Security: Passwords & 2FA
The fundamentals of account security, explained in this presentation.
Phishing: The Most Common Attack
Protect your team from the most common attack against nonprofits - phishing!
Online Privacy: Controlling Your Data
Is it possible to disappear from the internet? Find out how in this presentation!
Guides
Protect Your Online Donation Page from a Fraud Attack
Read about another organization’s experience and learn how to prevent it from happening to you.
What’s a VPN + How to Choose a VPN
Let our Virtual Private Network (VPN) Guide help you figure out why you should use a VPN and how to choose which one to buy.
What to Do If You’re on a Breach List
Your email and password have been found in a new data breach! Learn what can you do to secure your account.
Activities
Threat Modeling
Lead your team through a dynamic and interactive threat modeling exercise to build buy-in for digital security.
Human Network Map
This interactive activity illuminates how encryption can secure your communications.
Artwork & Zines
Cybersecurity with Pigeon: Protect Your Accounts
Learn about password best practices alongside our favorite internet-loving Pigeon!
Cybersecurity with Pigeon: Encryption
Learn about secure messaging alongside our favorite internet-loving Pigeon!
Cybersecurity with Pigeon: Sticker Sheet
Print your own Pigeon stickers, adorable reminders about digital security best practices!
External resources we love.
Referrals to articles, guides, and organizations we've learned from!
Digital Security
Electronic Frontier Foundation’s Surveillance Self-Defense Guide
Hackblossom’s DIY Guide to Feminist Cybersecurity
Hackblossom’s DIY Cybersecurity for Domestic Violence
Our Data Bodies Project Digital Defense Playbook
Our Data Our Selves The Organizer's (Data) Activity Book
Electronic Frontier Foundation’s Security Education Companion
Consumer Report’s Security Planner
Security First’s Umbrella App
Freedom of the Press Foundation’s Do You Need Antivirus?
Zebra Crossing Digital Security Guide
Open Briefing’s Holistic Security Protocol for Human Rights Defenders
Precisely Private’s Good Privacy Practices Guide
Incident Response
Security Without Borders’ Guide to Quick Forensics
A Strategy Guide to Prepare For, Defend Against, and Clean Up After a Social Media Harassment Attack
How to Respond to a Subpoena: A Guide for Domestic Violence Organizations
Protesting, Surveillance, and Privacy Offline
Revolution and Us Pocket Guide to Direct Action Zine
Get in Formation: A Community Safety Toolkit by Vision Change Win
Data for Black Lives Crash Course on Surveillance
Multilingual Resources
Digital Privacy Tips for Abortion Seekers from Asian Americans Advancing Justice - AAJC
Online Safety Resources from the Australian government in 25+ Languages
Privacy & Online Harassment
Speak Up and Stay Safe(r): A Guide to Protecting Yourself from Online Harassment from Feminist Frequency
Guide to DMCA Takedown Requests from Without My Consent
CA Goldberg PLLC’s Incident Tracking Chart
Access Now’s Self Doxing Guide
The New York Times’ Guide to Doxxing Yourself on the Internet
OnlineSOS’s Assess and Take Action Guide
PEN America’s Online Harassment Field Manual
Brightline’s Manage Your Online PII
Maru: An Online Harassment Support Chatbot
Katy Levinson’s Privacy Guide for Activists with Haters
Yael Grauer’s Big Ass Data Broker Opt Out List
Terms of Service; Didn’t Read’s guide to policy policies in plain text
HeartMob’s Social Media Safety Guides
Right to Be’s Online Harassment Resources
Tactical Tech’s Data Detox Kit
Crimethinc’s Doxcare: Prevention and Aftercare
Take Back the Tech’s Hey Friend! Guide to Helping a Friend Experiencing Online Harassment
Clinic to End Tech Abuse’s Resource List
Criminalization of Abortion, Digital Security, and Surveillance
Color of Surveillance: Policing of Abortion and Reproduction Reading List
Self-Care, Criminalized: Report by If/When/How on self-managed abortion criminalization from 2000 - 2020
Morrison Foerster Privacy Tips for Protecting Reproductive Rights
Security Culture & Operational Security (OpSec)
Front Line Defenders Workbook on Security
Confidence. Courage. Connection. Trust: modern security culture zine for organizers
What Is Security Culture? updated zine (pdf)
What is Security Culture? original article
You Have the Right to Remain Silent: Know Your Rights Guide by the National Lawyers Guild
If An Agent Knocks: guidance from the Center for Constitutional Rights
Holistic Security for Abortion Stigma-Busting Work by Inroads
Nonprofit Technology
Idealware’s Nonprofit Technology Policy Workbook
Online Privacy Practices for Nonprofits by Electronic Frontier Foundation
SOAP App for Creating Simple Custom Security Policies
iEcology’s Guide to Onboarding & Offboarding
TechImpact’s Technology Learning Center
NTEN’s Courses & Nonprofit Technology Conference
Safe & Documented for Activism: Security Policies & Procedures for Activist Organizations
Serving People Facing Technology Facilitated Abuse by Reclaim the Sector
Frontline Policies: Holistic Security Procedures and Policy Templates from Open Briefing