Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

How to safely open a suspicious link

Let’s unpack encryption

Encryption has existed since 1900 BC, histories say that a normal man in Egypt used  a simple c…

Signs that your phone has been hacked

Do you know that sometimes we end up using devices that have been hacked without knowing. This place…

Money making as a cause for cyber harrassment:blogging

The era that we are living is an era where money is made from the web. Many people have taken bloggi…

7 horrible forms of cyber harassment

Cyber harassment is one most common types of harassment in the present day. It is hard to know wheth…

5 easy Steps for getting backup codes for your google account

Backup codes come in handy in a situation where you can not access your phone or are on a flight but…

How to set up two factor authentication on your email using desktop

Hello to every reader reading this, in the past week, I have been uploading videos on tiktok and You…

1 4 5 6 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *