Choose a category
With more of us working from home, we’re having to provide our own IT support. Here are five simple steps to help you protect your personal Wi-Fi network.
In addition to our online accounts, the elements of our digital identity are scattered all over the internet – social media conversations, shopping patterns, credit history, location data and so on. We explore how to consolidate your digital identity with a focus on online accounts.
More of us are relying on the cloud to store, sync and share data. What are some of the risks involved and what good habits could help you better secure your cloud storage?
Being a digital hoarder is just as stressful as hoarding physical things. Many of us traverse the digital world with extremely poor cyber hygiene, leaving many of us at a heightened (and probably unnecessary) level of risk. In this article, we provide a five-part process for spring cleaning your cyberself.
Like many people, the first thing you do when you pick up a rental car is to try to connect your phone to your car’s infotainment system. Think twice though. You should protect your personal data and privacy when connecting your phone to a rental car.
By ‘regular people’, we mean people who have no interest or need to know the intricate details of technology. These podcasts are great for regular people who want to improve their awareness of how to protect their digital lives.
Further reading and useful tools
We have no affiliation with the individuals and organisations whose resources are shared in this section. We link to them here solely for your information.
Join the conversation
Follow us on social media.