Be wary of the various tactics and methods used by cyber criminals to “Phish” for your information. Avoid working hard to recover from a phishing...
Scams are real, and people are falling victim to them daily. These perpetrators have raised the bar when it comes to their craft. As such, it is...
It is our responsibility to make sure that children are neither perpetrators nor victims of cyberbullying. Here are some tips to help protect...
The South African constitution and many other African countries have no tolerance for bullies. Many people have suffered under the oppression of...
Remember that you may protect yourself and your loved ones from cyberbullying with the help of the Protection from Harassment Act, 2011 (Act 17 of...
Click here for free infographic! Around this time of the year, many consumers eagerly anticipate bargains, as companies and retailers seek to...
In the past a cellphone was just a cellphone, you made your calls to your loved ones, communicated an SMS via text, or at a later stage, you were...
It is the second week of CSAM. This week we will be focusing on protecting your devices and protecting yourself from malware. We have attached...
Now more than ever before we're storing important, often irreplaceable files on our computers– precious family photos and videos, financial...
Securing your home wireless network. When using Wi-Fi, the absolute minimum security you should enable is wireless encryption and password...
Updating your operating system (OS) Your mobile phone operating system (OS) manages all functionality on your device. Some examples of...

Resource Search

Subscribe

Get every new article on your e-mail