media resources

Welcome to our comprehensive cybersafety resource hub tailored specifically for reporters, journalists, and news anchors. Dive into expert interview tips, best practices, and essential cybersecurity principles for media designed to empower you in delivering impactful stories while safeguarding your digital presence. Stay informed, inspired, and protected as you navigate the dynamic world of media.

cybersafety and cybersecurity journalism

Essential Tips & Cybersecurity Principles

prevent detect correct icon

Prevent, Detect, Correct

avoid eliciting fear in viewers icon

Avoid Eliciting Fear

spotting false sense of security icon

false sense of security

the risk of reputational damage icon

the Risk of Reputational Damage

dispel myth of boring cyber icon

Dispel the Myth of Boring Cyber

transparent cybersecurity story icon

Transparent Cyber security Story


Questions for Investigative Reporting By Category

This section provides a comprehensive list of questions to guide investigative reporters in uncovering critical information in a cybersecurity analysis. Whether it’s privacy breaches, emerging cyber threats, or scam victimization, these questions help journalists dig deeper and produce well-rounded, impactful stories.

  • What specific data was compromised in the breach?
  • How was the breach detected, and how long did it take to identify the issue?
  • What steps has the company taken to address the breach and prevent future incidents?
  • How is the company communicating with affected individuals?
  • What are the current challenges in integrating cybersecurity education into school curriculum?
  • How effective have recent initiatives been in increasing youth awareness of cybersecurity?
  • What support is available for educators to teach cybersecurity concepts?
  • How is the industry working to improve diversity in cybersecurity careers?
  • What trends do the latest statistics reveal about cybercrime?
  • How are government and industry leaders responding to these trends?
  • What role do public-private partnerships play in combating cyber threats?
  • Are there any significant gaps or areas needing improvement in current cybersecurity efforts?
  • What specific data was compromised in the breach?
  • How was the breach detected, and how long did it take to identify the issue?
  • What steps has the company taken to address the breach and prevent future incidents?
  • How is the company communicating with affected individuals?
  • What specific vulnerabilities are most concerning in the healthcare sector?
  • How does the organization ensure compliance with healthcare data protection regulations?
  • What best practices can other healthcare organizations adopt to enhance cybersecurity?
  • Are there any recent incidents that have prompted changes in security protocols?
  • What are the most significant emerging threats identified by your organization?
  • How is the company preparing to address these new threats?
  • What collaborations or partnerships are in place to enhance threat intelligence sharing?
  • Can you provide examples of recent incidents involving these emerging threats?

Properly Vetting a Cybersecurity Expert

  • Look for industry-recognized certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA).
  • Review their work history to ensure they have relevant experience in the cybersecurity field.
  • Review their interview and public speaking history.
  • Ask how they resolved specific challenges they have faced and other real-world security issues.
  • Ensure they are familiar with relevant guidelines and standards like GDPR, HIPAA, PCI-DSS, and ISO/IEC 27001.
  • Check if they have published articles, whitepapers, or research in the cybersecurity field.
  • Participation in conferences, webinars, or cybersecurity communities can also indicate their level of expertise.
  • Ensure they can explain complex concepts in a clear and understandable manner to both technical and non-technical stakeholders.

Applying cybersecurity principles to articles

“Individuals affected by YRDSB’s Nov. 8 cybersecurity incident will soon be notified”

“Ticketmaster: 560 Million Human Identities Have Been Stolen. Who’s At Risk?”