From 01224edc6ec6e8dfb6e0052ea5f0b810a5d8424f Mon Sep 17 00:00:00 2001
From: Lisa Jervis <lisa@iecology.org>
Date: Fri, 27 Oct 2017 14:45:16 -0700
Subject: [PATCH] formatting fix

---
 README.md | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/README.md b/README.md
index 45726dd..dda899f 100644
--- a/README.md
+++ b/README.md
@@ -9,37 +9,37 @@ The documents in this repository comprise a set of digital security checklists f
 
 # Contents
 
-1. [Introduction](1_checklist_introduction.md)
+1. [Introduction](1_checklist_introduction.md)  
 About these checklists and how they can help you.
 
-2. [Readiness Assessment Tool](2_readiness_assessment_tool.md)
+2. [Readiness Assessment Tool](2_readiness_assessment_tool.md)  
 A tool for assessing whether an organization has the requisite baseline capacities needed to successfully take on new digital security practices. Any challenges identified should be met before attempting to increase digital security levels through other means.
 
-3. [Directions](3_directions_and_legend.md)
+3. [Directions](3_directions_and_legend.md)  
 How to use these documents and what the symbols in them mean.
 
-4. [Device Security Checklist](4_device_security_checklist.md)
+4. [Device Security Checklist](4_device_security_checklist.md)  
 All security depends on the ability to control your devices. This checklist helps you do that.
 
 5. [Password and Authentication Checklist](5_authentication_checklist.md)  
 A checklist of tasks related to improving the way you identify, or "authenticate," yourself to the services you use, including password management practices.
 
-6. [Wireless Network Safety Checklist](6_wireless_checklist.md)
+6. [Wireless Network Safety Checklist](6_wireless_checklist.md)  
 A checklist of tasks related to improving security levels when depending on wireless networks.
 
-7. [Email Safety Checklist](7_email_safety_checklist.md)
+7. [Email Safety Checklist](7_email_safety_checklist.md)  
 A checklist of tasks related to safe(r) use of email.
 
-8. [G Suite Security Checklist](8_gsuite_security_checklist.md)
+8. [G Suite Security Checklist](8_gsuite_security_checklist.md)  
 A checklist to help you set up and use the security controls in Google's domain-based services.
 
-9. [Appendix A: Glossary](A_glossary.md)
+9. [Appendix A: Glossary](A_glossary.md)  
 A glossary defining the technical terms used in these documents in as non-technical language as possible.
 
-10. [Appendix B: Assumed Threat Model](B_threat_model.md)
+10. [Appendix B: Assumed Threat Model](B_threat_model.md)  
 A narrative threat model describing assumed operating environment, end-user capabilities, and adversary capabilities for use by technical readers and technical support personnel.
 
-11. [Appendix C: Frequently Asked Questions](C_FAQ.md)
+11. [Appendix C: Frequently Asked Questions](C_FAQ.md)  
 A set of questions and answers about these checklists including their origin, design, and how to provide feedback on them.
 
 ## Finally...
-- 
GitLab