Part 1: Threat Landscape
Understanding the Digital Risks
This section establishes the context and urgency for digital security. Here we explore why feminist movements in the MENA region are specific targets.
Adversary Analysis
"We do feminist work. That makes some people angry—governments, religious groups, trolls. And when people are angry, they attack. That's just the reality."
🏛️
State Actors
Surveillance & Censorship
🗣️
Anti-Rights Groups
Trolling & Doxxing
🎭
Opportunistic Hackers
Phishing & Scams
Part 1: Threat Landscape
How They Target Us
The Three Most Common Attacks
📧
Phishing
Deceptive emails designed to steal your password or trick you into clicking malicious links
👁️
Surveillance
Someone watching or recording your online activity and communications
💬
Harassment
Organized campaigns to intimidate, silence you, or make you shut up and go away
📧
Phishing
Deceptive emails designed to steal your password or trick you into clicking malicious links
📖 Plain English:
Phishing = Fake emails that look real, trying to trick you into giving up passwords or clicking malicious links
Protection Tips:
- Never click links in unexpected emails - Even if they look legitimate
- Go directly to websites yourself - Type the URL manually or use bookmarks
- Call/message sender directly - Use a number you already have, not one from the email
- Check for typos in domain names - "fundation.org" instead of "foundation.org"
- Use a sandbox environment - A safe space to test whether a link or file is dangerous, ex Windows Sandbox
Who's Watching:
- ISPs (Internet Service Providers) - Can see all websites you visit
- Governments - Can request data from ISPs and tech companies
- Apps & Websites - Track your behavior and location
What They Can See:
WITHOUT Encryption: Everything - like reading postcards
WITH Encryption: Only that you're communicating, not the content - like sealed envelopes
How to Protect Yourself:
- Use VPN on public WiFi - Especially for sensitive work
- Use encrypted messaging - Signal for sensitive conversations
- Review app permissions regularly - Limiting what they can access reduces how much of your information can be exposed
- Avoid posting sensitive info publicly - Once online, assume it's permanent
Common Tactics:
- Doxxing - Publishing personal information (address, phone, family)
- Mass Trolling - Coordinated campaigns flooding your accounts
- Threatening Messages - To you and your family/friends
Never Share Publicly:
- ❌ Home address or precise location
- ❌ Phone number
How to Protect Yourself:
- Keep a backup communication channel - In case your main account gets compromised
- Report doxxing or impersonation to the platform immediately - Most major platforms now treat it as a serious violation
- Keep a “response plan” ready - Who to contact, what to remove, and what to document
- Use separate accounts - Personal vs. work/activism
- Hide friends/followers list - Don't reveal your network
Part 2: Personal Security Toolkit
Fortifying Individual Defenses
This section is focused on individual empowerment. We will deconstruct common security practices, providing clear, actionable steps to secure your personal accounts and devices, from creating strong passphrases to protecting your finances online.
Part 3: Organizational Security Protocols
Protecting Collective Assets
Security is a team sport. Here, we transition from individual actions to collective responsibility, exploring organizational policies for data management, office security, secure communications, and ensuring a safe digital lifecycle for all team members.
Part 3: Data Management
Safeguarding Sensitive Information
Understanding what data needs protection, implementing secure backups, and managing cloud storage safely to prevent leaks and ensure business continuity.
Part 4: Countering External Threats
Advanced Defense Strategies
With a strong internal foundation, we can now face the outside world. This section provides strategies to defend against external adversaries, focusing on tools like VPNs and preparing for physical device risks.
Part 5: Action Plan & Response
Incident Response Plan
When a security incident happens, every minute counts. Having a clear, documented response plan means you won't waste precious time figuring out what to do.
Why You Need This Template
This template guides you through immediate actions, damage control, and recovery steps—so when panic sets in, you have a trusted roadmap to follow.
Download and customize this plan for your organization. Print it out and keep it somewhere accessible. When an incident occurs, you'll be ready.
Part 5: Action Plan & Response
From Plan to Practice
Knowledge is only useful when applied. This final section translates learning into immediate, sustainable action. We'll cover three critical tasks to complete today, outline a simple incident response plan, and provide resources for continued support.
Do These 3 Things Today
Resource Guide
Security Tools Cheat Sheets
A comprehensive, printable reference guide for all security tools and guidelines covered in this workshop.