Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

How to safely open a suspicious link

3 crazy secrets about Google Photos and hacking

Today we will be placing a focus on Google Photos and hacking. Did you know that if a hacker manages…

Diving into QR code phishing attacks

There is currently an increased number of QR code phishing attacks. There’s always a beauty be…

FINGERPRINTS; SECURITY FEATURES

Fingerprint identification is the method of identifying people with patterns on their fingertips. Fi…

3 common types of backups

What is a backup? When talking about types of backups, we must not forget to define what backup is. …

How to create an SSL certificate: 7 key great steps

To guarantee users that their information is safe, you have to create an SSL certificate for your we…

Anonymity tools for people at risk

Everybody can be at risk despite the level of risk. Thanks to technology anonymity tools have been d…

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *