}
Know How

Digital Communication Security

Step 3: Reduction

Is it really necessary to keep all our information, or does this make us vulnerable? Some data may be deleted or hidden. We have to classify which content is a “friend” or an “enemy” of our security. In the case of publications on social networks, some key words are easily located by malicious groups.

Take your list from Step 2 and try to analyse which information may be deleted or hidden. Pay attention to the information that needs to be maintained and replicated in backup copies.