See here for cybersecurity-standards information from which might be obtained, insights into the security measures and processes helpful for an entity’s security.
Using phones and computers as motion detector alarmsEdit
Phones and computers can be turned into motion detector alarms, by using their built-in cameras and other sensors, with apps such as the “Haven: Keep Watch” app. This could provide extra security during sleeping hours. Psychic phenomena, including phenomena that have been verified and accepted by the scientific community, might be able to induce a person to stay asleep or suffer amnesia whilst intruders enter premises and room whilst the person is asleep; technological measures such as loud alarms may be helpful to defend against such attacks.
Steganography: easy hiding of information in computer documentsEdit
White-on-white text in computer documents and emails can be used for hiding and sending security sensitive information. This might be both simple and effective for low threat models.