Learning hub

Training and education resources

Tech Warrior learning hub

Learn more about the intricacies of building a website and staying safe while surfing the Internet

Sign up to our newsletter

Tech Warrior’s Memory Bank.

A newsletter designed to demystify the the internet.

Please enter your name.
Please enter a valid email address.
Something went wrong. Please check your entries and try again.
Two Factor Authentication

Mastering two-factor authentication

Two-factor authentication (2FA) adds an essential layer of security to your online accounts by requiring two forms of identification before granting access.

Shop with confidence: Master the art of secure online purchases

Shop with confidence: Master the art of secure online purchases

Online shopping offers convenience, variety, and savings, but it also requires vigilance to ensure that your financial and personal information remains secure.

Tech-Warrior__Data-safety-and-the-Internet__04

Understanding phishing: The bait that bites

We’ve explored this topic before but phishing is so widespread and scammers are constantly finding new and even more devious ways to lure you in that we figured it was time for a reminder and an update.

Tech-Warrior__Dont-get-hooked__Header-image__Beware-of-phishing-bait

Beware of phishing bait

Phishing attacks often rely on the element of allure, tempting you with enticing ‘baits’ designed to exploit your curiosity or desire.

Tech-Warrior__Dont-get-hooked__Header-image__Urgency-and-threats

How scammers manipulate you with urgency and fear tactics

Beware of emails that ask for sensitive information, legitimate organisations rarely request sensitive details via email.

Tech-Warrior__Dont-get-hooked__Header-image__Strange-requests

Requests for sensitive or strange information

Beware of emails that ask for sensitive information, legitimate organisations rarely request sensitive details via email.

Tech-Warrior__Dont-get-hooked__Header-image__Suspicious-links-and-attachments

Suspicious links or attachments

Email scams and phishing attacks often rely on dubious links and infected attachments to trick unsuspecting victims into compromising their security.

Your time is limited, so don't waste it living someone else's life. Don't be trapped by dogma - which is living with the results of other people's thinking. Don't let the noise of others' opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition.

—Steve Jobs