@@ -6,7 +6,7 @@ The documents in this repository comprise a set of digital security checklists f
**These documents are designed for use in the U.S. domestic context and focused on common vulnerabilities. Use in other countries or to defend against highly aggressive and/or resourced attackers is not recommended without further threat analysis and tuning of content. [Contact us](https://iecology.org/contact) if you need support using these checklists in that way.**
**This document is version 2.0 and was last updated in September 2017.**
**This document set is version 2.0 and was last updated in September 2017.**