New website structure
- **Assess & Plan**
- [ ] Threat modeling
- [ ] Scenarios - Personas
- [ ] Information security policy
- [x] [Protect against physical threats](https://securityinabox.org/en/phones-and-computers/physical-security/)
- [x] Travel policy
- [x] Communications plan
- [ ] How to choose software
- [ ] How to choose operating system
- **Protect**
- [ ] Malware prevention (part of current [malware guide](https://securityinabox.org/en/phones-and-computers/malware/))
- [ ] Phishing prevention (part of current [passwords](https://securityinabox.org/en/passwords/) and [malware](https://securityinabox.org/en/phones-and-computers/malware/) guides) (issue #230)
- [ ] Guide on self-care and prevention of social media anxiety - Toc in issue #241 - first in Communications section, then to be moved here
- [**Passwords**](https://securityinabox.org/en/passwords/)
- [x] [Create and maintain strong passwords](https://securityinabox.org/en/passwords/passwords/)
- [x] [Manage your passwords safely](https://securityinabox.org/en/passwords/password-managers/)
- [x] [Use two-factor authentication](https://securityinabox.org/en/passwords/2fa/)
- **Organize**
- [ ] Collaborative writing
- [ ] File storage, sharing and transfer (issue #223)
- [ ] Discussions - mailing lists, forums
- [ ] Inform - newsletters, announcement channels
- [ ] Coordinate - Spreadsheets, surveys, polls, calendars
- [ ] Manage websites - CMS, static websites
- **Accounts**
- [x] [Protect yourself and your data when using social media](https://securityinabox.org/en/communication/social-media/)
- [x] Managing multiple online identities - Pseudonymity; identity and reputation; how to create and protect a new identity online - issue #246
- [x] [Recover from possible account compromise](https://securityinabox.org/en/communication/account-compromise/)
- **Communications**
- [x] Secure communications - Communications plan & basics (will be linked from the Assess & Plan section when the latter is created) - ToC in issue #238
- [x] Safe email (part of current [guide on private communications](https://securityinabox.org/en/communication/private-communication/)) - ToC in issue #236
- [x] Safe chat (part of current [guide on private communications](https://securityinabox.org/en/communication/private-communication/)) - ToC in issue #239
- [ ] Safe video conferencing (part of current [guide on private communications](https://securityinabox.org/en/communication/private-communication/)) - ToC in issue #240
- [ ] Guide on self-care and prevention of social media anxiety - Toc in issue #241 - to be moved to the Protect section when this is ready.
- [ ] Safe video publishing
- [ ] Safe streaming
- **Devices**
- [ ] Reaction to malware infections (part of current [malware guide](https://securityinabox.org/en/phones-and-computers/malware/))
- [x] [Protect your Android device](https://securityinabox.org/en/phones-and-computers/android/)
- [x] [Protect your iOS device](https://securityinabox.org/en/phones-and-computers/ios/)
- [x] [Protect your Windows device](https://securityinabox.org/en/phones-and-computers/windows/)
- [x] [Protect your macOS device](https://securityinabox.org/en/phones-and-computers/mac/)
- [x] [Protect your Linux device](https://securityinabox.org/en/phones-and-computers/Linux/)
- [ ] Advanced OSs for malware prevention: live USBs, Tails, Qubes (for SiaB use cases) (see issue #234)
- **Internet**
- [x] Safe browsing (ToC in issue #242)
- [x] How the internet works and how websites are blocked (part of current [Visit blocked websites and browse anonymously](https://securityinabox.org/en/internet-connection/anonymity-and-circumvention/))
- [x] Visit blocked websites - how to choose a VPN (part of current [Visit blocked websites and browse anonymously](https://securityinabox.org/en/internet-connection/anonymity-and-circumvention/)) (would address issue #178) - outline in issue #244
- [x] What is anonymity and how to anonymize your connections (part of current [Visit blocked websites and browse anonymously](https://securityinabox.org/en/internet-connection/anonymity-and-circumvention/)) (issue #177) - outline in issue #245
- **Data and metadata**
- [x] [Protect your sensitive information](https://securityinabox.org/en/files/secure-file-storage/)
- [x] [Back up and recover from information loss](https://securityinabox.org/en/files/backup/)
- [x] [Destroy sensitive information](https://securityinabox.org/en/files/destroy-sensitive-information/)
- [x] [Destroy identifying information](https://securityinabox.org/en/files/destroy-identifying-information/)
issue