Addressing risks to information integrity necessitates a wide range of proactive, early warning and reactive responses including but not limited protection, communications and advocacy. The following ...