We have scaled to meet a 66% surge in demand for our support over the past two years, with our international team now responding to 11 new cases every week. We are expanding our diverse, inspired, and purpose-driven team. Will you join us as our new digital and information security consultant?
Tag: digital security
Job alert! Digital and information security coordinator
By building resistance and resilience among those challenging unaccountable power, Open Briefing supports a shared vision for a world where communities and ecosystems can thrive. We are expanding our diverse, inspired, and purpose-driven team. Will you join us as our new digital and information security coordinator?
We’re hiring! Digital and information security consultants
We are expanding our diverse, inspired, and purpose-driven team; will you join us as one of our new digital and information security consultants? You will provide expert and tailored digital, information security, and technology advice and training to grassroots organisations and activists and their international partners at risk. And you will help disrupt attacks and reprisals from capable and motivated adversaries.
We’re hiring! Director of digital and information security [Closed]
Open Briefing is seeking a director to lead our digital and information security team and workstream in order to help build resistance and resilience among the people and communities challenging power. The main focus of this senior role will be on leadership, strategy, growth, and culture. We offer fair pay, sector-leading benefits, and progressive leave policies, including a salary of £70,000 per annum.
Passwords: The first (but not only) digital line of defence
Passwords are an essential part of our digital lives. But despite their pervasiveness, there is much confusion around passwords and how they should be properly used. In this post, we will go back to basics and look at passwords generally along with some specific problems and solutions.
A simple approach to protecting your information: Part 3
In the third part of our series on information security, we set out the next step for you to consider: Where should your most valuable and sensitive information be? Information security is difficult. The more locations the information is at and the longer it is there, the greater the chances of compromise and the more resources required to secure it.
A simple approach to protecting your information: Part 2
In the second part of our series on information security, we set out the next step for you to consider: Where is your most valuable and sensitive information? You have to secure that information everywhere it is located across a wide variety of forms, including paper, digital, and mental. If you are unable to locate this information, then you cannot expect to secure it.
A simple approach to protecting your information: Part 1
In the first part of our new series on information security, we set out a simple approach to help you archive, back up or destroy a lot of the information that may be causing you concerns. You can then focus your energy (and limited resources) on rolling out appropriate security measures for the most valuable and sensitive information that you work with.