Cyberbullying

It’s so easy to circulate an embarrassing photo or post a hurtful comment from behind a desk. Worse still, malicious words may be sent directly to the intended victim to keep...

Read article
Recognize cybercrime

Internet of things

Your coffee is ready when you wake up, there’s a message on your phone to say the washing is done and the thermostat knows when and how much to heat...

Read article
Protect yourself

Recognize fake websites

You’re looking for information about a product. You click and read and then click again. The next day, you find you can't log in. Pre-occupied with your search, you didn't...

Read article
Protect yourself

Everyone can be a hacker

Before you know it, there’s malware on your laptop. Simply because you left your desk for a while - maybe to get a cup of coffee. Nothing wrong with that,...

Read article
Recognize cybercrime

Data confiscation abroad

When you go on holiday, you take all your valuables with you. These days, everything you need to run your day-to-day life, your memories and expertise are stored on your...

Read article
Protect yourself

Privacy and mobile apps

An app which shares your photos with friends, orders your dinner and measures your sporting achievements. And then there’s one with funny sounds. The game that you've already finished. And...

Read article
Protect your privacy

Keep data secure

Just sending a file from one device to another or making a copy. Via an external hard drive, the cloud or your email. Easy as pie. But where did you...

Read article
Protect yourself

Privacy by design

You collect data for your research or for your work. A name here, an address there. But do you really need all that data? And does everyone know what you...

Read article
Protect your privacy

Data breaches

You clicked on the wrong button by accident, and inadvertently sent a file with payment details to all of your clients. A colleague lost his USB stick. Someone came across...

Read article
Protect your privacy