Skip to content
Snippets Groups Projects
Commit e5defeca authored by JSS's avatar JSS
Browse files

update date fix

parent 392d2f70
Branches antifascista
No related tags found
No related merge requests found
...@@ -13,7 +13,7 @@ This set of documents was made to help small non-profit organizations improve th ...@@ -13,7 +13,7 @@ This set of documents was made to help small non-profit organizations improve th
## When was this document set created and last updated? ## When was this document set created and last updated?
**This document was last updated in September 2017.** **This document was last updated in October 2017.**
These documents were originally researched and peer reviewed in fall 2015. Some small edits and a minor 1.1 revision in spring 2017 updated and improved the [Readiness Assessment Tool](2_readiness_assessment_tool.md) and other checklist language based on field experience. A major version 2.0 release was completed in September 2017. This version includes a review, update, and extension of the checklist set. It adds a [Device Security Checklist](4_device_security_checklist.md) and [G Suite Security Checklist](8_gsuite_security_checklist.md), as well as an [Assumed Threat Model](A_threat_model.md) for technical readers. All new content was peer reviewed. Contact [RoadMap Consulting](https://roadmapconsulting.org) or [Information Ecology](https://iecology.org/contact) with questions about this process or content. These documents were originally researched and peer reviewed in fall 2015. Some small edits and a minor 1.1 revision in spring 2017 updated and improved the [Readiness Assessment Tool](2_readiness_assessment_tool.md) and other checklist language based on field experience. A major version 2.0 release was completed in September 2017. This version includes a review, update, and extension of the checklist set. It adds a [Device Security Checklist](4_device_security_checklist.md) and [G Suite Security Checklist](8_gsuite_security_checklist.md), as well as an [Assumed Threat Model](A_threat_model.md) for technical readers. All new content was peer reviewed. Contact [RoadMap Consulting](https://roadmapconsulting.org) or [Information Ecology](https://iecology.org/contact) with questions about this process or content.
......
...@@ -6,7 +6,7 @@ The documents in this repository comprise a set of digital security checklists f ...@@ -6,7 +6,7 @@ The documents in this repository comprise a set of digital security checklists f
**These documents are designed for use in the U.S. domestic context and focused on common vulnerabilities. Use in other countries or to defend against highly aggressive and/or resourced attackers is not recommended without further threat analysis and tuning of content. [Contact us](https://iecology.org/contact) if you need support using these checklists in that way.** **These documents are designed for use in the U.S. domestic context and focused on common vulnerabilities. Use in other countries or to defend against highly aggressive and/or resourced attackers is not recommended without further threat analysis and tuning of content. [Contact us](https://iecology.org/contact) if you need support using these checklists in that way.**
**This document set is version 2.0 and was last updated in September 2017.** **This document set is version 2.0 and was last updated in October 2017.**
# Contents # Contents
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment