Protected Voices: Patching, Firewalls, and Anti-Virus Software

Hello, I’m Henry, a special agent with the FBI. If you’re working for a political campaign, it’s critical that you protect your campaign’s network environment. In this video we’ll cover three specific ways to keep your network safe: software patches, anti-virus software, and firewalls. Patching is the installation of software updates on computers, routers, and…

Protected Voices: Browser and App Safety

Your campaign personnel at every level are almost certain to be using web browsers and mobile applications as they perform work duties with official and non-official devices. These tools are essential for research and communications, but they could also be openings through which bad actors may intrude into your systems. Hi, I’m Pyroe, an intelligence…

Protected Voices: Social Engineering

Hello, I’m Jay, a special agent with the FBI. Welcome to social engineering—or, more bluntly, targeted lies designed to get you to let your guard down. Social engineering is the most common technique deployed by criminals, adversaries, competitors, and spies to exploit humans and computer networks. That’s because it’s all too simple—you don’t need any…

Protected Voices: Information Security (InfoSec)

Hi, I’m Jason, a special agent with the FBI. Information Security is the protection of your data. When we refer to InfoSec, we’re also referencing your policy detailing responsibilities and expectations of your campaign’s employees. Humans are almost always the weakest link in any computer network. Even the strongest security measures can be rendered useless…

Protected Voices: Router Hardening

Did you know there is one device that all your traffic goes through? Your emails, your web surfing, your smart refrigerator—they all connect to the Internet through one device: your router. Hi, I’m JR, a special agent with the FBI. I’m here to share some tips to make your Internet router more secure. Your router…

Protected Voices: Safer Campaign Communications

Hi, I’m Erica, a computer scientist with the FBI. In this video, we’ll talk about how a few proactive communication practices can effectively enhance your campaign’s overall cybersecurity. Given the importance of communications to a campaign, both in managing its operations as well as connecting with voters, it’s no surprise that communications also represent a…

Protected Voices: Wi-Fi

Hi, I’m Raushaunah, a special agent with the FBI. I’m here to talk about some of the dangers associated with using public Wi-Fi. Campaigns today need to connect in real time to potential voters, campaign workers, and volunteers. However, you’ve got to take precautions to secure your communications and online activity. This is especially true…

Protected Voices: Incident Response

No matter how strong your cyber defenses may be, you cannot block every possible attack on your computer network. How can you prepare for the worst-case scenario—a successful cyber attack on your campaign’s network? Hello, I’m Hadley, a special agent with the FBI. I’m here to share some recommendations for drafting an incident response plan….

Protected Voices: Have You Been Hacked?

Hi, I’m Ronnee, a staff operations specialist with the FBI. Today I’m going to talk about possible indicators that your computer system or devices may have been hacked. However, before delving into those, I want to emphasize the importance of adhering to the cybersecurity principles outlined in the other videos in this series. Chances are,…

Protected Voices: Passwords

Hi, I’m Karen, a special agent with the FBI, and I’d like to share with you some things you can do to prevent attackers from accessing your campaign’s networks. We all use passwords. We use them for our phones, our login to our computers, our email, or other personal online accounts. Unfortunately, many of us…