7 min read
An international human rights NGO with a headquarters team of 25 and field offices in three countries. The organization documents human rights abuses, advocates before international bodies, and provides direct support to at-risk communities. They work with whistleblowers, witnesses, and partner organizations in politically volatile regions.
Their funders include major foundations and government development agencies — all of whom have increasingly specific requirements around data handling, incident response capability, and compliance documentation.
We started with a comprehensive security assessment that served two purposes: identifying the actual risks the organization faced, and producing the documentation their funders required.
This wasn't a checkbox exercise. We mapped the organization's real threat landscape — including the specific threat actors known to target human rights organizations in their operating regions — and assessed their current controls against those threats. The output included both a technical remediation roadmap and a compliance-ready summary their grants team could share with funders.
We ran role-specific training sessions for headquarters and field staff. For field teams, this meant practical training on recognizing targeted phishing, securing mobile devices, and safe communication practices when working in high-risk environments. For headquarters staff, we focused on handling sensitive data, recognizing social engineering, and understanding what to do (and who to call) if something looked wrong.
The training was built around the threats that actually target organizations like theirs — not generic corporate security slides about password hygiene.
We deployed Matrix/Element as the organization's encrypted communications platform, replacing personal WhatsApp and consumer video tools. This gave them end-to-end encrypted messaging and video conferencing with organizational user management, device verification, and retention controls — critical for an organization where a compromised communication channel could put people at physical risk.
For document management, we set up Nextcloud on our EU/Iceland infrastructure, providing encrypted file storage with version control, shared workspaces, and granular access controls. Field offices can securely access and share documents without sending sensitive files over email or storing them on personal devices.
We built a lightweight but functional incident response capability tailored to the organization's size and resources. This included a response plan with clear roles and escalation paths, pre-built communication templates, and a designated response contact at Secure Origin for the first 90 days.
We ran a tabletop exercise simulating a compromised field device — walking through detection, containment, notification, and recovery with the people who would actually be responsible. The exercise surfaced several gaps in communication between field offices and headquarters that were fixed before they mattered in a real incident.
"For the first time, we can tell our funders exactly how we protect the data they trust us with — and show them the evidence."
Does this scenario sound like your organization?
Every engagement starts with a scoping call — no sales pitch, just a conversation about your threats, your team, and what you need.
Schedule a call