4. Your capabilities

What can I do now to limit the negative impact of these threats?

_THE FINAL PART OF YOUR RISK ASSESSMENT depends on your personal capability. At this point, you know who you’re concerned with, and have an idea of what these actors are capable of. In light of your concerns, how far can you go to protect the data you value?

A familiarity with core concepts in digital security is the first step in gaining the ability to know how to respond to the risks you have identified.

STEP 1

Start with the low-hanging fruit. Follow our best practices as you build out your digital security practice.

STEP 2

When considering your risk assessment at the beginning of a project, consider any resources you may need to tighten your team’s digital security.

  • Time: Do I need to schedule time to sit down with the team and establish what tools we’ll use to communicate?
  • Money: Do I need to budget for new hardware?
  • Technical skill: Are there skills I might need training on to defend against my adversaries?

more ways to understand your risk:
Risk Assessment

1. Your assets

What do I have to protect?

Footage, transcripts, messages, contacts - all of these pieces of data make up the vast collection of your digital assets.

Learn more
Risk Assessment

2. Your adversaries

Who am I concerned about?

Some adversaries are immediately obvious: a border agent, or a legal threat. Others may be less obvious, hidden from view or behind a screen a continent away.

Learn more
Risk Assessment

3. Your adversaries’ capabilities

What are likely threats I might face over the course of this project?

The more information you’re able to gather about your adversary early on, the better you’ll be at anticipating their capabilities, and practically protecting your assets based on what you know.

Learn more