Cybersecurity Checklist for Political Campaigns
Lenny Zeltser
MAY 3, 2019
To understand the basis for these recommendations, read the documents mentioned at the end of the post. Attackers stole sensitive documents. Adversaries have routinely pursued sensitive campaign documents. Consider when to send attachments and when to share links to documents in cloud storage. campaigns from around 2016.
Let's personalize your content