Market Segment

News Media

Think. Differently.

Knowledge is protection

Journalists are particularly vulnerable to snooping and hacking by malicious actors, while anyone engaging in any type of digital activity is at risk of security breaches or cyber attacks. Communications and data held on news reporters’ devices are of particular interest to government agencies, large corporations, small businesses, and many different organizations.

When journalists deal with cybersecurity and take defensive measures, they not only protect their own personal data and that of news organizations, but also damage the independence and integrity of the press. In some cases, data protection is even more important and becomes a critical security issue. Journalists should consider digital cybersecurity as important as reporting on current events with honesty and passion. In particular, reporters working on investigative stories or disclosures are at risk, and data can become a matter of life and death

Cyber crime is not a fair game

Overview & Areas of Concern

Anonymize and encrypt internet traffic with a VPN

VPN or Virtual Private Network is a powerful tool that anonymizes Internet activity by hiding device location and protecting data from unsafe or potentially dangerous Wi-Fi networks.

A VPN also allows access to websites that may be restricted in certain regions, so users can bypass strict censorship regulations in many areas. For example, a journalist covering a crisis in a country where the government is censoring content that doesn’t align with their political agenda can freely access websites and streaming media with a VPN installed.

VPN software can be used on desktop computers, laptops, tablets and mobile devices. Many VPN providers allow multiple downloads on all devices with a single subscription.

Delete metadata, browsing history and cookies.

Hackers know how to find an incredible amount of information about anything and everyone on their device, including someone’s career and what stories they’re currently working on.

Sensitive details that can help cybercriminals hide in a user’s metadata, browsing history, and cookies. These details should be thoroughly and regularly deleted to reduce the risk of leaks or breaches. Naturally start clearing these items from your browser.

Be aware of IoT devices

Internet of Things (IoT) devices are always recording information around us. The most common culprit is ordinary smart home tech like Alexa, but various devices such as refrigerators, baby monitors and home security cameras can all pose a security risk.

If you need to have a confidential discussion or make a sensitive phone call, a thorough inspection of the space can catch any IoT device that might be eavesdropping on confidential conversations.

failure is not an option

Create secure backups

Using a cloud storage system and/or external hard drive is invaluable in protecting your business. As cloud storage technology evolves, this is the best option in terms of cost, security, and access – but a hard drive can also be useful as long as the user can keep it secure (i.e. physically locked).

Enable private browsing

The browsers to use are those that allow private mode browsing, especially when the goal is to dig up controversial information. When private browsing is enabled, any information that can be retrieved from the activity will not be saved by the browser to the current computer or device when the window is closed. This includes cookies, browsing history, and details entered in form fields. Again, a good habit to pick up and maintain.

Use data encryption and strong passwords

A journalist is much safer when their entire machine or user account is encrypted, rather than trying to protect data file by file. This encryption must be secured with a strong password that is unique and not easily identified by a dictionary attacking hacker.

Journalists who take all the security measures listed above to protect themselves and their sensitive data are in a better position to take cyber security than what comes to mind. Journalism is an important industry, and while it comes with its own set of risks, the world is a better and more informed place because of the critical work produced by ruthless reporters.

Cyber Security to Consider

Free Cyber Review
Compromise Assessment and Vulnerability Scan
Virtual Chief Information Security Officer
SOC Compliance.

Practice Areas

Security Monitoring/Security Operation Center (SOC) Virtual CISO (vCISO)
Security Assessment
Security Compliance Support (Audit Preparation)
CMMC Assistance
SOC 2 Type 1 & Type 2 Assistance
Digital Forensics
Security Controls Preparation (NIST / CMMC)
Security Architecture Design/Support
Security Awareness Training
Vulnerability Management
Security Policy creation

Let's discuss your specific questions & needs!

You Deserve The Best Cyber Security

over 30 years of experience

the key to success

Practice Areas

One of the biggest problems for online news publishers is credential filling, a cyberattack in which stolen usernames, phone numbers, email IDs and passwords are used to gain unauthorized access to a user’s account on a digital platform.

Breaching sensitive journalism data not published
Unauthorized access to infrastructure
Operational disruptions
Intellectual property theft

Hackers take advantage of virtual events in various ways, including impersonating legitimate participants, to commit social engineering scams. Security breaches have increased with the increasing adoption of virtual events – from trolls resorting to harassing and mocking speakers to hackers targeting the virtual activity’s network for confidential data such as intellectual property and personally identifiable data.

Our goal is to help people in the best way possible. This is a basic principle in every case and cause for success. contact us today for a free consultation. 


Sign up to our newsletter