@@ -13,7 +13,7 @@ This set of documents was made to help small non-profit organizations improve th
...
@@ -13,7 +13,7 @@ This set of documents was made to help small non-profit organizations improve th
## When was this document set created and last updated?
## When was this document set created and last updated?
**This document was last updated in September 2017.**
**This document was last updated in October 2017.**
These documents were originally researched and peer reviewed in fall 2015. Some small edits and a minor 1.1 revision in spring 2017 updated and improved the [Readiness Assessment Tool](2_readiness_assessment_tool.md) and other checklist language based on field experience. A major version 2.0 release was completed in September 2017. This version includes a review, update, and extension of the checklist set. It adds a [Device Security Checklist](4_device_security_checklist.md) and [G Suite Security Checklist](8_gsuite_security_checklist.md), as well as an [Assumed Threat Model](A_threat_model.md) for technical readers. All new content was peer reviewed. Contact [RoadMap Consulting](https://roadmapconsulting.org) or [Information Ecology](https://iecology.org/contact) with questions about this process or content.
These documents were originally researched and peer reviewed in fall 2015. Some small edits and a minor 1.1 revision in spring 2017 updated and improved the [Readiness Assessment Tool](2_readiness_assessment_tool.md) and other checklist language based on field experience. A major version 2.0 release was completed in September 2017. This version includes a review, update, and extension of the checklist set. It adds a [Device Security Checklist](4_device_security_checklist.md) and [G Suite Security Checklist](8_gsuite_security_checklist.md), as well as an [Assumed Threat Model](A_threat_model.md) for technical readers. All new content was peer reviewed. Contact [RoadMap Consulting](https://roadmapconsulting.org) or [Information Ecology](https://iecology.org/contact) with questions about this process or content.
@@ -6,7 +6,7 @@ The documents in this repository comprise a set of digital security checklists f
...
@@ -6,7 +6,7 @@ The documents in this repository comprise a set of digital security checklists f
**These documents are designed for use in the U.S. domestic context and focused on common vulnerabilities. Use in other countries or to defend against highly aggressive and/or resourced attackers is not recommended without further threat analysis and tuning of content. [Contact us](https://iecology.org/contact) if you need support using these checklists in that way.**
**These documents are designed for use in the U.S. domestic context and focused on common vulnerabilities. Use in other countries or to defend against highly aggressive and/or resourced attackers is not recommended without further threat analysis and tuning of content. [Contact us](https://iecology.org/contact) if you need support using these checklists in that way.**
**This document set is version 2.0 and was last updated in September 2017.**
**This document set is version 2.0 and was last updated in October 2017.**