Cyberbullying
It’s so easy to circulate an embarrassing photo or post a hurtful comment from behind a desk. Worse still, malicious words may be sent directly to the intended victim to keep...
Read articleInternet of things
Your coffee is ready when you wake up, there’s a message on your phone to say the washing is done and the thermostat knows when and how much to heat...
Read articleRecognize fake websites
You’re looking for information about a product. You click and read and then click again. The next day, you find you can't log in. Pre-occupied with your search, you didn't...
Read articleEverything is forever on the internet
You had such a great time that evening. And you were more outspoken back then. A tagged video here, a reaction to a blog, tweet or old school project there......
Read articleEveryone can be a hacker
Before you know it, there’s malware on your laptop. Simply because you left your desk for a while - maybe to get a cup of coffee. Nothing wrong with that,...
Read articleData confiscation abroad
When you go on holiday, you take all your valuables with you. These days, everything you need to run your day-to-day life, your memories and expertise are stored on your...
Read articlePrivacy and mobile apps
An app which shares your photos with friends, orders your dinner and measures your sporting achievements. And then there’s one with funny sounds. The game that you've already finished. And...
Read articleKeep data secure
Just sending a file from one device to another or making a copy. Via an external hard drive, the cloud or your email. Easy as pie. But where did you...
Read articlePrivacy by design
You collect data for your research or for your work. A name here, an address there. But do you really need all that data? And does everyone know what you...
Read articleData breaches
You clicked on the wrong button by accident, and inadvertently sent a file with payment details to all of your clients. A colleague lost his USB stick. Someone came across...
Read article