Learning hub
Training and education resources
Tech Warrior learning hub
Learn more about the intricacies of building a website and staying safe while surfing the Internet
Sign up to our newsletter
Tech Warrior’s Memory Bank.
A newsletter designed to demystify the the internet.
We’ll keep communication brief and relevant.
Protecting personal information on social media
In the age of digital communication, social media platforms like Facebook, Instagram, and X have become key. They offer a space for connection, expression, and information sharing.
Understanding the role of software updates
Software updates play a critical role in protecting your digital devices and personal information. Like a vaccine for your computer, they often contain crucial protections against the latest discovered viruses and cyber threats.
Embracing the habit of regular cybersecurity check-ups
Just like regular visits to the doctor keep you healthy, periodic check-ups of your personal cybersecurity can keep your online presence in tip-top shape.
Mastering two-factor authentication
Two-factor authentication (2FA) adds an essential layer of security to your online accounts by requiring two forms of identification before granting access.
Shop with confidence: Master the art of secure online purchases
Online shopping offers convenience, variety, and savings, but it also requires vigilance to ensure that your financial and personal information remains secure.
Understanding phishing: The bait that bites
We’ve explored this topic before but phishing is so widespread and scammers are constantly finding new and even more devious ways to lure you in that we figured it was time for a reminder and an update.
Simple steps for stronger passwords
Creating a strong password is one of the fundamental steps in maintaining online security. A strong password acts as the first line of defence against unauthorised access to your personal and financial information.
Beware of phishing bait
Phishing attacks often rely on the element of allure, tempting you with enticing ‘baits’ designed to exploit your curiosity or desire.
How to spot red flags in emails
Here are some sure-fire ways to spot red flags when the lines are blurred or there’s ambiguity around an email’s legitimacy.