Subscribe to You-tube
Book an online digital security consultancy
-
Prevent adware attacks with these 5 useful tips
Adware has a high potential of harming your computer as well as destroying every information you have stored in it. Every computer user must take precautions while visiting sites with adverts, downloading apps from both known and unknown sources as well as using email clients who allow third-party services to use their spaces. To prevent […]
-
6 effective tips for checking phishing links
Tools for checking phishing links Phishing links have traditionally been used to steal people’s information or spread malware maliciously. This is a terrible habit that will not stop as long as the internet exists. And that is why checking phishing links is very important. There are several tools that can be used for identifying dangerous […]
-
7 sure ways on how to protect a website from spam
Having a huge number of spam comments and registrations on your WordPress site can be extremely annoying. Let’s also remember the risks associated with spam and think of how to protect a website from spam because it is necessary for our safety. What can happen if you don’t protect a website from spam? Once a […]
-
6 signs of a Facebook hacked account
Most victims of hacking get to realize that their Facebook account was compromised after over a month. During this period, the hacker gains serious control on the Facebook hacked account. At this point, he can make as many changes as possible to personalize the account and make it comfortable enough for him to use it […]
-
3 free tips on how to recover a hacked facebook account with changed email and password?
The present-day hackers go as far as changing the email and password associated with a Facebook account to prevent the account owner from recovering. This article will give you tips on how to recover a hacked Facebook account with changed email and password. In the past two weeks, as a digital security blogger, I encountered […]
-
3 Good Phishing attack examples
One of the most recent phishing attacks is the UNICEF Phishing campaign that has consumed money from innocent people who are deceived by fraudsters that they will benefit millions of money. Usually when a phishing campaign is launched by hackers or scammers whichever never you choose to use, a lot of techniques are used. Let’s […]
-
5 easy tips for hacked Facebook account recovery
Are you currently having a hacked Facebook account or are worried about your account being hacked in the future? You have opened your Facebook page and all of a sudden the username and the profile picture is different, there are so many strange posts and a lot has been changed. Relax, you are not yet […]
-
How to safely open a suspicious link
Suspicious links could lead to the theft of information or even cause severe damage to your device. Imagine you have got a new email and everything is just not adding up. The domain of the email looks suspicious and even the language its self looks suspicious. How do you open such a link to make […]
-
7 dangerous types of phishing attacks
There are various types of phishing attacks. However, in this article, we will determine the most common. type of phishing attack is always determined by the motive behind the phishing attack and who the phishing attack is being launched on. What does the attacker want to achieve? Who is he launching the phishing attack on? […]
-
16 effective ways of fighting phishing
Phishing has become a famously practiced evil in the current day internet. Today I just want to give you and me tips for fighting phishing. Let me begin by defining phishing. Phishing is the practice of sending messages to people while pretending to be from a reputable organization, to obtain personal information for misuse What […]
-
7 great tips for WordPress backend protection
When it comes to how to wordpress backend protection, every developer has their method. The success of the method depends on the problem the developer wants to avoid. It is crucial to keep our sites safe and the focus should not just be on the hosting panel but also the dashboard and the file system […]
-
3 crazy secrets about Google Photos and hacking
Today we will be placing a focus on Google Photos and hacking. Did you know that if a hacker manages to access your Google account, they will be able to see your Google photos too and if they happen to be sensitive, then they will be able to misuse the information? If a Google account […]
-
Diving into QR code phishing attacks
There is currently an increased number of QR code phishing attacks. There’s always a beauty behind scanning a QR code to access a service. Before you open any QR code, there’s a link behind it. Unfortunately, a few people will think that the link behind that win a lottery QR code is a deadly link […]
-
FINGERPRINTS; SECURITY FEATURES
Fingerprint identification is the method of identifying people with patterns on their fingertips. Fingertips have been used for a very long time, since the world’s beginning. You understand that in the early days, fingerprints were used instead of signatures because most people didn’t know how to write. If there was a land agreement to be […]
-
Explaining the different types of backup
What is a backup? Backup is copying of physical or virtual files of a database to a secondary location so that in case of any unfortunate situation, there is already a copy available. Backing up is necessary when dealing with copies of computer files to avoid a complete loss. Even when handling websites, it is […]
-
How to create an SSL certificate: 7 key great steps
To guarantee users that their information is safe, you have to create an SSL certificate for your website. What is an SSL Certificate? Fortnet defines an SSL certificate as a file hosted within the web page’s origin server that holds the data browsers use when viewing and interacting with the page. https://www.fortinet.com/resources/cyberglossary/ssl-certificate Whenever a user […]
-
Anonymity tools for people at risk
Everybody can be at risk despite the level of risk. Thanks to technology anonymity tools have been developed to render protection by hiding IP addresses, not storing search histories Lawyers, journalists, media workers, and other human rights defenders, including persons at risk like asylum seekers, refugees, victims of human trafficking, and everybody else should learn […]
-
6 useful steps for installing The Tor browser on your computer
Tor browser is one of the most famous anonymity tools used by at-risk groups of people. Anonymity is key for people who may be at risk of being put under surveillance, facing hacking, and a possibility of what they search putting them into trouble. In this article, I will be taking you through the steps […]
-
4 crazy reasons for viewing search history
When it comes to google accounts being safe, we shouldn’t limit the level of precaution we must take because there’s a possibility of someone viewing your search history on google. There are many reasons people give for viewing search history A google account is often the center of attraction for most hackers because the moment […]
-
6 great sure don’ts of password management
Password mismanagement has often led to loss of vital information; at risk populations have faced surveillance due to password mismanagement, information has got leaked and fallen to wrong hands, thus many people endanger their online life to the point of putting their physical life in danger as well. Not only has password mismanagement led to […]
-
HOW TO CREATE PUBLIC AND PRIVATE KEYS FOR ENCRYPTING AND DECRYPTING EMAIL MESSAGES
In the previous week, I made a video that takes you through the steps of encrypting and decrypting emails and now i just want to note down the steps right here. You should be able to watch the video through the link below Asymmetric encryption also referred to as public key cryptography uses public key […]
-
STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION
It is amazing how far we have come with encryption. I believe if you came across my past posts on encryption, you had a grasp on what symmetric and asymmetric encryption is about. These are adventurous topics that dive you into the world of technology, especially while communicating via email. Today we are going to […]
-
EXPLAINING SYMMETRIC AND ASYMMETRIC ENCRYPTION
Every organization has one way of encrypting and decripting data, the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the situation. While using the ATM card system, banks use symmetric encryption because it is faster and convenient. Remember so […]
-
Let’s unpack encryption
Encryption has existed since 1900 BC, histories say that a normal man in Egypt used a simple code of hieroglyphic substitution in the tomb of Khnumhotep. So how did the man do this? By simply altering code and that’s where I am coming to. What is encryption? It is simply the process of disguising/ converting […]
-
Signs that your phone has been hacked
Do you know that sometimes we end up using devices that have been hacked without knowing. This places us at risk and the information that we have; sometimes it could be financial information like emails containing our financial card details, identity information. Here are the signs to look out for if you think you have […]
-
Money making as a cause for cyber harrassment:blogging
The era that we are living is an era where money is made from the web. Many people have taken blogging as a source of income and it’s a good thing. It only becomes a problem when it starts having a negative impact on the lives of other people who are online. I made a […]
-
Different forms of cyber harrassment
It is hard to know that we are facing or we are being the implementors of cyberharrassment when we don’t even know the types. Back in the day, i didn’t know that i was harrassing someone when i threw a comment on a post in order to attract the attention of other people. All i […]
-
How do i get back up codes to use as a second layer of security for my gmail account?
Back up codes come handy in a situation where you can not access your phone or are in a flight but need to access the internet. They are safe to the point that once used, a code can not be reused again. However caution needs to be taken while storing these codes. If you are […]
-
How to set up two factor authentication on your email using desktop
Hello to every reader reading this, in the past week, I have been uploading videos on tiktok and You-Tube about setting up two factor authentications in our gmail accounts using smart phones. I will summarise that right below this text so you can watch the video of what I was saying before we dive into […]
-
How to use kaspersky ant-virus for free
I have got you covered today and isn’t it great that we are at the second phase of using kaspersky anti-virus on our phones. Hello, today am going to give you the steps for using kaspersky anti-virus on our phones for ultimate protection. The anti-virus has often been reliable in detecting malware for a long […]
-
How to install antivirus in mobile phone
This is quite an interesting topic. Hi, how are you, I am writing this blog post at night here in Africa and I can’t wait to grant you the anti-virus answer you have been searching for . Without an anti-virus on your phone, you become a victim of malware and when you are a victim, […]
-
7 effective strategies for maintaining mobile phone security
Hello, this ought to be my very first post in this blog and I am so excited to stay safe online with you. Today specifically I would love to talk about keeping your phone and its content safe. And below I will be giving you various tips that will keep you going. It is obviously […]
[USM_plus_form] t
Hello, What kind of digital security help do you need today?. Fill the form so we can be of assistance
Click the icon below to send an email
Contact us for help in digital safety
WHAT WE DO
Cyber security practical tips
Safe website design
Digital security training
Installation of cyber security software
Monitoring of child devices