Learning hub
Training and education resources
Tech Warrior learning hub
Learn more about the intricacies of building a website and staying safe while surfing the Internet
Sign up to our newsletter
Tech Warrior’s Memory Bank.
A newsletter designed to demystify the the internet.
We’ll keep communication brief and relevant.

Mastering two-factor authentication
Two-factor authentication (2FA) adds an essential layer of security to your online accounts by requiring two forms of identification before granting access.

Shop with confidence: Master the art of secure online purchases
Online shopping offers convenience, variety, and savings, but it also requires vigilance to ensure that your financial and personal information remains secure.

Understanding phishing: The bait that bites
We’ve explored this topic before but phishing is so widespread and scammers are constantly finding new and even more devious ways to lure you in that we figured it was time for a reminder and an update.

Simple steps for stronger passwords
Creating a strong password is one of the fundamental steps in maintaining online security. A strong password acts as the first line of defence against unauthorised access to your personal and financial information.

Beware of phishing bait
Phishing attacks often rely on the element of allure, tempting you with enticing ‘baits’ designed to exploit your curiosity or desire.

How to spot red flags in emails
Here are some sure-fire ways to spot red flags when the lines are blurred or there’s ambiguity around an email’s legitimacy.

How scammers manipulate you with urgency and fear tactics
Beware of emails that ask for sensitive information, legitimate organisations rarely request sensitive details via email.

Requests for sensitive or strange information
Beware of emails that ask for sensitive information, legitimate organisations rarely request sensitive details via email.

Suspicious links or attachments
Email scams and phishing attacks often rely on dubious links and infected attachments to trick unsuspecting victims into compromising their security.