Home > information security

Tag: information security

A simple approach to protecting your information: Part 5

In the fifth part of our series on information security, we set out the final step for you to consider: What security measures will contribute to achieving the identified goal? These measures will broadly fall into three categories: paper (policies, procedures, and guidelines), people (roles, responsibilities, and practices), and tech (requirements and implementation).

Read more

A simple approach to protecting your information: Part 4

In the fourth part of our series on information security, we set out the next step for you to consider: What information security goal do you seek to achieve? This might be confidentiality, integrity, availability, or anonymity. You should decide on a primary goal for each of your most valuable and sensitive information assets. You can then implement security measures to achieve this goal.

Read more

We’re hiring! Director of digital and information security [Closed]

Open Briefing is seeking a director to lead our digital and information security team and workstream in order to help build resistance and resilience among the people and communities challenging power. The main focus of this senior role will be on leadership, strategy, growth, and culture. We offer fair pay, sector-leading benefits, and progressive leave policies, including a salary of £70,000 per annum.

Read more

We’re hiring! Information security consultants

Open Briefing is recruiting information security consultants to help to secure the most-valuable and -sensitive information of organisations and activists fighting for a just and equitable world. To apply, you must have expertise and experience that goes beyond digital security. You will need a proven track record of working in information security roles and with nonprofits, foundations, or activists. We welcome applications from all who meet the person specification and particularly from candidates who are from historically-marginalised communities and are underrepresented in our team.

Read more

A simple approach to protecting your information: Part 3

In the third part of our series on information security, we set out the next step for you to consider: Where should your most valuable and sensitive information be? Information security is difficult. The more locations the information is at and the longer it is there, the greater the chances of compromise and the more resources required to secure it.

Read more

A simple approach to protecting your information: Part 2

In the second part of our series on information security, we set out the next step for you to consider: Where is your most valuable and sensitive information? You have to secure that information everywhere it is located across a wide variety of forms, including paper, digital, and mental. If you are unable to locate this information, then you cannot expect to secure it.

Read more

A simple approach to protecting your information: Part 1

In the first part of our new series on information security, we set out a simple approach to help you archive, back up or destroy a lot of the information that may be causing you concerns. You can then focus your energy (and limited resources) on rolling out appropriate security measures for the most valuable and sensitive information that you work with.

Read more