Data Security Tools, Part II
Dec. 9, 2025
Editor’s note: This is the second installment of a multi-part series on data security. It includes a chapter excerpt from “The Journalist’s Toolbox: A Guide to Digital Reporting and AI”.
Virtual Private Networks
Before I can file my students’ grades at UIC, I must first pass through two-factor authentication, then log-in through a virtual private network…


