Security Operating Procedures

How to Create a Secure Twitter Account

Since the beginning of the uprising, Twitter has been a central front in Syria’s cyber war. Groups like the Syrian Electronic Army regularly hack the accounts of various organizations to spread their pro-regime message. To protect your Twitter account, you need to take some basic...

How to Use Skype Securely from a Computer

Skype is a Voice Over IP (VOIP) tool for communicating through voice and chat. However, Skype conversations are vulnerable to external monitoring. Others may be listening in. To secure your conversation, you need to take some basic security steps. This guide tells you how to...

Secure Facebook Fan Page

Facebook Fan Pages are an essential communication tool for many organizations, but they are also a common target of attacks. To avoid having your Facebook page compromised, you and your organization should use Facebook safely and make the most of its security features. This guide...

How to use an Android Smartphone Securely

A smartphone is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than simple mobile phones. Android-based phones are a common example of these devices. These phones are often used to access the internet and services like Facebook....

How to Browse the Internet Securely on a Window based Computer

Going on the internet without an encryption tool is unsafe. Internet service providers, government authorities, and hackers can track and monitor unencrypted web traffic given the proper tools and expertise. This guide provides the basic steps to help prevent monitoring of your internet browsing and...

How to Securely Delete Files from Your Computer Using CCleaner

Emptying your computer’s Recycling Bin or Trash bin does not actually delete files. Instead, the files meant for deletion are marked as available for being overwritten by new files. This means that the files can still be recovered by special programs. To fully and securely...

How to Protect your Windows PC from Malware

Good digital security starts with the basics. One of the most fundamental ways to protect yourself online is to use strong passwords. Similarly, if you use strong passwords, but have weak password recovery questions, then your passwords are still vulnerable. To secure your computer and...

How to Protect your Online Accounts

Good digital security starts with the basics. One of the most fundamental ways to protect yourself online is to use strong passwords. Similarly, if you use strong passwords, but have weak password recovery questions, then your passwords are still vulnerable. To secure your computer and...