Recent Articles

Security training activities for NGO staff using Umbrella app

2021-02-28

Security training activities for NGO staff using Umbrella app Given the safety and security issues faced by NGO staff in high-risk settings, there is a need to train NGO personel on how to handle certain issues such as kidnapping, evacuation and arrests. If you train activists, aid workers or journalists in operational security, Umbrella can help! It’s a free, open-source security app built by security trainers. Here are some easy activities using Umbrella that you can integrate into your next training.

Read full article

Umbrella for Security Training: Five things you should know about Umbrella

2021-02-28

Umbrella for Security Training: Five things you should know about Umbrella Do you train activists, aid workers or journalists in digital and physical security? So do we. That’s why we built Umbrella, a completely free, open-source Android, iOS and web app packed with the latest security advice. Get Umbrella from Google Play, iOS Store, Amazon, F-Droid or use the online web app. 1. Umbrella is based on trusted security resources Security in a Box (by Tactical Technology Collective and Front Line Defenders).

Read full article

Umbrella: A free, simple security app for NGOs

2021-02-28

Umbrella: A free, simple security app for NGOs NGOs face new threats on all fronts, digital and physical. If you’re having to defend your reputation, legal status, and funding, you’re not alone. And the security implications are serious. In a hostile climate, a range of actors are empowered to undermine your work—and they have resources. You don’t. You can’t afford to maintain a really robust, comprehensive security policy, let alone enforce it.

Read full article

How to manage security using a free app, Umbrella

2021-02-22

How to manage security using a free app, Umbrella You do security. It might say so in your job title, or it might not. You might not even have a job title. But if you’re making decisions about a team of people—where they work, how they get there, how they communicate—and you’re trying to keep them safe, we need your help. We’re security people ourselves. We face the same problems you do when it comes to managing team security.

Read full article

Umbrella for NGOs: Security Tips for Lower Risk Users

2021-02-22

Umbrella for NGOs: Security Tips for Lower Risk Users For some people, security is a matter of life or death. That’s why we created Umbrella. It’s a free, open-source Android, iOS and web app with the latest security advice for NGOs. If you urgently need information for your security situation, we hope you use the Umbrella app to find what you’re looking for right away, whether it’s a lesson, a tool guide, or a link to emergency support.

Read full article

Aidex 2018

2018-09-18

Aidex 2018

Security First will be at AidEx in Brussels this 14th and 15th November, talking about how our free Umbrella app can help teams in high risk environments.

Read full article

Efail

2018-05-15

Efail 50% Screen size-- This post was created for the “Email” lesson in Umbrella, the free, open-source security advice app for people at risk. Get Umbrella from Google Play, Amazon, and F-Droid. This week, security researchers released information about vulnerabilities in PGP email clients that could expose past or future content, even if it was encrypted. EFF [warned (https://www.eff.org/deeplinks/2018/05/not-so-pretty-what-you-need-know-about-e-fail-and-pgp-flaw-0) users of these email clients to disable or uninstall PGP plugins and switch to another secure communication method.

Read full article

iSEC Partners Umbrella App Code Audit

2015-11-07

iSEC Partners Umbrella App Code Audit In keeping with our philosophy of supporting open source code and greater transparency for security tools, today we are releasing the results of a recent code audit of Umbrella App by iSEC Partners (made possible thanks to the folks at the Open Technology Fund.) In total, the code audit found three vulnerabilities rated as “low” and seven rated as “informational.” We have described the vulnerabilities found and our response to them below.

Read full article