From 5a351d6606e4c97830eda8945232e2f343f594f9 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Tue, 12 May 2020 13:16:47 -0500 Subject: [PATCH] Feature posts on homepage --- index.html | 31 ++++++++++++++++++++++--------- 1 file changed, 22 insertions(+), 9 deletions(-) diff --git a/index.html b/index.html index c5d976dc..283e58f9 100644 --- a/index.html +++ b/index.html @@ -120,16 +120,29 @@ layout: default
-
-
- Informational planning icon +
+
+

Latest Updates

-
-

What should I do?

-
First, you need to make a plan.
-

Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But, don't worry! Security is a process, and by thinking ahead you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins with understanding the unique threats you face, and how you can counter them.

-

This process of identifying threats and defining countermeasures is called threat modeling, and it forms the basis of every good security and privacy plan.

- Learn More About Threat Modeling +
+ +