Ghost, help us fast track. Sats for insights.
Can you post up a bullet point list…in order of operation if necessary on just how to do this? It’s a lot to ask I know…but would be super valuable. Thanks for triggering my mind.
Login to reply
Replies (2)
First you need to do a threat analysis. Your situation and what is important to you to protect is completely different from anyone else.
There is a pdf threat analysis worksheet. You just print it out and fill it out. It's free, you just have to join the secure channel group.
Here's one

