thinking_about_security
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
thinking_about_security [2019/08/15 14:12] – neil | thinking_about_security [2019/08/15 19:33] – neil | ||
---|---|---|---|
Line 2: | Line 2: | ||
====Key points:==== | ====Key points:==== | ||
* [[thinking_about_security# | * [[thinking_about_security# | ||
- | * [[think_about_security#Be realistic, and think about client experience|Be realistic, and think about client experience]]Â | + | * [[thinking_about_security#Be realistic, and think about client experience|Be realistic, and think about client experience]]Â |
- | * [[think_about_security#Talk to your clients|Talk to your clients]] | + | * [[thinking_about_security#Talk to your clients|Talk to your clients]] |
* [[thinking_about_security# | * [[thinking_about_security# | ||
Line 25: | Line 25: | ||
If your clients are themselves experts, consider letting them take the lead. | If your clients are themselves experts, consider letting them take the lead. | ||
- | If you are for a very tech-savvy client, who you know uses encryption for some communications, | + | If you act for a tech-aware client, who you know uses encryption for some communications, |
- | Likewise, if they send encrypted attachments, | + | Likewise, if they send encrypted attachments, |
- | (You might always want to //offer// encrypted communications, | + | (You might always want to //offer// encrypted communications, |
====Security is ongoing==== | ====Security is ongoing==== |
thinking_about_security.txt · Last modified: 2021/07/06 09:26 by 127.0.0.1