Security considerations in your M2DMM Strategy
We encourage you to manage both the spiritual and technological risks.
Spiritual
“For we do not wrestle against flesh and blood, but against the rulers, against the authorities, against the cosmic powers over this present darkness, against the spiritual forces of evil in the heavenly places.” Ephesians 6:12
“For the weapons of our warfare are not of the flesh but have divine power to destroy strongholds.” 2 Corinthians 10:4
Jesus said “Behold, I am sending you out as sheep in the midst of wolves, so be wise as serpents and innocent as doves.” See Matthew 10:16-33.
Listen to God’s guidance for the battle, just like David.
“Shall I go up against the Philistines? Will you give them into my hand?” The LORD said to David, “Go up, for I will certainly give the Philistines into your hand.” And David came to Baal-perazim, and David defeated them there. And he said, “The LORD has broken through my enemies before me like a breaking flood.” 2 Samuel 5:19-20
Technology
- Consider using a Digital Hero
If you live in a high-risk area, consider finding a Digital Hero, someone who lives in a secure location to sponsor your digital accounts.
- Use an email and password Manager
You will be setting up multiple accounts when running M2DMM. It is vital that all accounts have secure passwords that are never the same. We highly recommend using a password manager.
- Watch out for fraudulent emails and messages
Never give out your personal info in response to an unsolicited request.
- Add Protection to all your devices
All partners should be in agreement on security practices. This can include:
- turning on screen lock
- creating strong passwords
- encrypting devices
- always installing the latest updates
- avoid turning on autofill
- not staying logged into accounts
- use multi-factor authentication
- using a VPN
- Set up Secure Sockets Layer (SSL) or HTTPS
If you have a website, it is vital to set up an SSL, which is used to protect sensitive information across the internet. It is encrypted so that the intended recipient is the only one who can access it.
- Secure backups
It is important to have backups and backups for your backups! If you have secure backups, then you will not have to worry about website crashes, accidental deletions, and any other major mistakes.
- Create a Risk Assessment and Contingency Plan
In high-risk areas, identify any potential security threats and create an appropriate response plan. Agree as a team how you will share involvement in work, how you will communicate electronically, and guidelines for team trust.
Click here to find all the steps of M2DMM/M2M in this post.
Your Progress
0 of 10 steps completedStart with Step 1 to begin your M2DMM strategy development journey.