A space where you can report websites that you find harmful for children.
The Security Auditing Framework and Evaluation Template for Advocacy Groups (SAFETAG) is a professional audit framework that adapts traditional penetration testing and risk assessment methodologies to be relevant to smaller non-profit organizations based or operating in the developing world.
The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats. The Kit offers a set of self-diagnostic tools for human rights defenders, bloggers, activists and journalists facing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.
Learn about the basics that will help you understand the risks you are exposed to when using the Internet.
MAKAIA | 2 min read | Oct 1, 2022
This space will teach you to recognize the characteristics of the threats and attacks called social engineering so that you can have information on how to avoid them.
MAKAIA | 3 min read | Sep 1, 2022
It has become increasingly common to read news on the internet where young people participate in viral challenges that have harmful consequences for their health or even for the rest of their lives and those of their families.
MAKAIA | 10 min read | Aug 1, 2022
The use of links and hyperlinks have made email correspondences easier in our corporate world. But do you know that a simple click on a link in a spam message can jeopardise an entire organisation’s email network? Although emails continue to be a widely used platform for professional communication, a lot of email users lack basic knowledge on how to use email safely.
Kwame Asante | 5 min read | Jun 7, 2022
Baby faces covered in chocolate, baby feet splashing in the water, cheeks soaked in crocodile tears. As we read the list, we might think of a post or story from social media that we sometimes encounter in the online space. But is it safe to share not only your personal information, but also that of a child who is in our care? What does it mean to be a responsible digital parent?
NIOK | 3 min read | Jun 1, 2022
Phishing is among the biggest cyber threats facing organizations. According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year.
Hive Mind | 3 min read | May 25, 2022
Smartphones are the most widely used electronic devices in our daily lives. Once upon a time, we used our cellphones only to call someone or send an important text message. These days, they have become more akin to portable computers. With a bundle of features, social networking, and time-saving apps, smartphones have become an essential part of our daily routine. Whether you are organizing your work schedule, hitting on someone on Tinder, ordering Chinese, or keeping track of your fitness regime, a secure cell phone provides peace of mind that your personal data will not end up in the hands of those who could use it to do you harm.
Hive Mind | 3 min read | May 19, 2022
What is digital security, and should civil society organisations in Africa be concerned?
Kwame Asante | 4 min read | May 17, 2022
Passwords are the key to nearly everything you do online, and you presumably have multiple passwords that you use throughout the day. Choosing hard-to-hack phrases and managing them securely can occasionally feel inconvenient. Fortunately, there are simple ways to make your passwords as secure as possible. Doing so can keep hackers from taking over your accounts and prevent theft of your data.
Hive Mind | 2 min read | Apr 29, 2022
In this article we have collected a few webinars available in English on HiveMind for the Hungarian audience.
NIOK | Mar 29, 2022
With the dramatic increase of our digital footprint (in other words, the footprint of our activities in the online word, e.g. use of social media sites, emailing, blogging, accepting cookies on various websites etc.... data protection is not only an issue for large companies, but it is equally important for civil society organisations and individual users as well. However, while the former can often employ a whole team of security experts, in case of civil society organisations it is an issue that we have to deal with ourselves. Keep in mind that the most precious information today is data and identity, therefore it is especially important to protect them.
NIOK | 2 min read | Mar 25, 2022
Social media is based on continuous positive feedback from other users on user messages. The operators of these platforms have an obvious interest in ensuring that users spend as much time as possible on their platforms, and to do this they have a wealth of data about what content is likely to be attractive to users. This leads to an increasingly strong conviction of the user's own truth in a community of positive feedback, even if that truth is based on completely nonsensical or deliberately manipulative facts.
Mertek Media Monitor | 3 min read | Mar 24, 2022
A user's digital footprint is the set of data that the user leaves behind about him or herself in the digital world. Intentionally or unknowingly, every day we create and leave a lot of data in the digital space that gives us a picture of who we are, what we do, where we are in the digital world and why we do it.
Mertek Media Monitor | 3 min read | Mar 23, 2022
Value, nowadays, comes in lots of different forms. We have traditional ones, such as time, power, security, health, and money. However, there is another, new form of value which is not yet fully understood: digital information. In this article, our aim is to raise awareness about how Facebook affects us and our loved ones on a daily basis, and how not knowing our rights and the help we can receive open us up to potential harm in the cyberspace.
Mertek Media Monitor | 6 min read | Mar 23, 2022
Phishing is a serious threat in our modern world, and there is no knowledge passed down from generation to generation of how to prevent it. This knowledge we have to acquire ourselves so that we can pass it on to the next generation. The number of hacking and phishing attempts has been increasing from year to year, in direct proportion to the fact that more and more activities in our lives are moving to the online space – from work to having fun and to shopping.
NIOK | 2 min read | Mar 23, 2022
The following article, written by Vladimir Garay of “Derechos Digitales”, talks about the implications of a facial recognition system in Chile for mass surveillance and the fight against common crimes.
MAKAIA | 4 min read | Mar 1, 2022
Every day millions of people access the internet and browse through countless content within the reach of a few clicks. Children and teenagers are connecting more and more frequently, finding facilities to access information, knowledge and opportunities, while exposing themselves to different risks such as cyberbullying, sharing private information with strangers, sexual exploitation online, among others.
MAKAIA | 2 min read | Feb 21, 2022
What would you do if you are a victim of cyberbullying? Laura Zapata Ortiz lived this experience and decided to help those who face a similar situation. Today she is part of our program "School of Influencers". This is her story.
MAKAIA | 3 min read | Feb 21, 2022
A survey recently conducted by TechSoup has revealed how social organizations around the world are working with data. At the same time, collaboration, communication and technological trends for the social sector explain the panorama where 5 major trends for the sector stand out.
MAKAIA | 4 min read | Feb 18, 2022
This article is the result of a 2021 MozFest workshop co-facilitated by Laura Vidal (Mozilla), Marielos Galindo (Red Concausa), Natalia Trigoso (Causas Digitales) and Soledad Magnone (JAAKLAC iniciativa). The activity aimed at exploring the possibilities of digital education practices to amplify the participation in data protection/privacy policies.
JAAKLAC iniciativa | 4 min read | Feb 18, 2022
Save the dates, mark your calendars and get ready to go! These are the five Media Literacy Events you simply cannot miss in 2022!!!
Hive Mind | 3 min read | Feb 14, 2022
The state of cyber-security in North Macedonia: interview series
Goce Arsovski | 4 min read | Feb 8, 2022
PERSONAL DEMOCRACY FORUM UKRAINE (PDF UA 2022) is back!
This year PDF UA will be held on March 3-4 in Kyiv in a hybrid form.
The “Future of the Elections” is the main topic this year.
TechSoup Europe joins OPORA, TransparenCEE Network and OSCE ODIHR for the fifth time and brings "tech4good", transparency, and open data topics to the Ukrainian debate about democracy and the role of civil society.
Tytarenko Yaroslava | 2 min read | Jan 28, 2022
This article is a production of Ciudadania Inteligente (Ciudadania AI), a Latin American, inclusive and feminist organization that fights for social justice and for the transformation of democracies.
MAKAIA | 6 min read | Jan 12, 2022
Social media platforms allow users to interact in a faster and easier manner. On one hand, this phenomenon helps establishing relationships and bonds beyond physical boundaries, leading to the exchange of information and content of all kinds. It is also not a secret that these platforms offer users tools for commercializing goods, products and services.
CIVIX Colombia | 4 min read | Jan 3, 2022
ESI Digital from JAAKLAC aims to promote Comprehensive Sexuality Education (CSE, ESI for its Spanish acronym) in relation to digital technologies to minimize online sexual risks among adolescents. The guide covers topics such as sexual and reproductive rights, digital education, internet risks in adolescence and digital safety strategies.
JAAKLAC iniciativa | 6 min read | Dec 21, 2021
Most often when we notice media articles about a hacking incident, it is usually because the target (or a victim) is a larger, more well-known company to the public. When Google, Facebook, Microsoft, etc. are victims of a cyber-incident, and the media are naturally interested in the topic, and thus inform the public. However, almost regardless of the magnitude and sophistication of such attacks on well-established companies and organizations, they are almost always "resolved", i.e., they have their own beginning, course, and end, or resolution. The resolution is not always "positive" for the company institution: sometimes victims pay huge sums of money (usually in cryptocurrencies) to attackers in order to get their data back.
Goce Arsovski | 8 min read | Nov 22, 2021
Many of us (if not all) usually lock the front door of our home, even when we go out to a nearby shop or café. Especially, if we live in a building with more tenants, or our home is facing a busy street - sometimes we even make sure our windows are closed as well! It is clear and unambiguous why we are doing this - we are concerned for our safety, and we do not want anyone (without our explicit permission) to enter our home!
In other words, our sense of security is important to us when it comes to our immediate physical environment - the privacy of our own home.
Goce Arsovski | 9 min read | Nov 19, 2021
We live in the Information Age. Our ability to synthesize and use information well is crucial to our fate and future well-being. Our Experts have been designing bespoke courses on topics that are relevant, set in a meaningful context and important. From making sense of the news online, to protecting your own or your organization’s digital safety and privacy.
Hive Mind | 3 min read | Nov 15, 2021
The large number of likes, comments or distributions does not mean that it reflects the real number of people involved in that interactivity. The online public sphere is often contaminated by Bots and Trolls.
Dren Gerguri | 3 min read | Sep 23, 2021
If this pandemic has taught us anything, it’s the fact just how important basic, daily hygiene habits are in our daily lives, and how much can they protect us from billions of bacteria and viruses. Did you know that perhaps this very behaviour has probably “saved us” in the past while we were exposed to a viral pathogen, maybe even COVID19?
Goce Arsovski | 7 min read | Jul 30, 2021
According to the "Digital 2021"1 report, at the turn of the year 2020 and 2021, more than half of the 7.83 billion people in the world were described as "mobile phone users", and 59.5% (4.66 billion) of the population – were stated to use the Internet. The vast majority of them use Social Media
(4.2 billion people)...
Dominika Uzar | 10 min read | Jul 26, 2021
According to the "Digital 2021" report, at the turn of the year 2020 and 2021, more than half of the 7.83 billion people in the world were described as "mobile phone users", and 59.5% (4.66 billion) of the population – were stated to use the Internet. Most of them use the Social Media (4.2 billion people).
Dominika Uzar | 5 min read | Jul 22, 2021
3 online games that help you develop your media literacy skills
Patryk Zakrzewski | 3 min read | Jul 22, 2021
This podcast episode brings together Anna Chęć and "Klara", who is a TechSoup Europe trainer from Poland, a security researcher, a hacktivist, currently working as a software security engineer for a financial institution. In this episode you can listen to what are some of the key threats once you buy a smartphone and why it is important to secure it well.
Dominika Uzar | 1 min read | Jul 19, 2021
In this episode Anna Chęć is talking to "Klara", who is - like Anna - a TechSoup Europe trainer from Poland, but on top of this, she is also a security researcher and a hacktivist. Anna and "Klara" are great at talking about complex security topics in an easy-to-digest, friendly and open manner. In this episode you can find out if there is such a thing as anonymity on the Internet.
Dominika Uzar | 1 min read | Jul 19, 2021
In this episode of our “Let’s Talk Digital Resilience!” podcast series, we’ll be joined by Anna Chęć, talking to "Klara" (a real-deal hactivist), who are both TechSoup Europe trainers on Digital Safety & Security.
Dominika Uzar | 1 min read | Jul 16, 2021
Do you ever look at the screen-time analysis on your smart phone and cannot believe the high number it displays? If not –great, but if you do –then this podcast is for you.
In this episode you will hear Jakub Górnicki talking to Kamil Śliwowski -
a Media Literacy, Open Educational Resources and Online Privacy expert.
Kamil explains how he has gone from becoming a techno-enthusiast to a real techie helping people better understand the negative effects of using technology...
Hive Mind | 1 min read | Jul 14, 2021
Welcome to the Hive Mind podcast series: “Let’s Talk Digital Resilience!”, where we would like to offer you a chance to enjoy 5 meaningful conversations led by top experts in the field of media technology, online security, and digital wellbeing.
Dominika Uzar | 1 min read | Jul 14, 2021
"Operational Security (OpSec) is a continuous process to ensure operational success in the face of adversaries. [...] Before you understand how to protect yourself, you should realise how to attack yourself."
- Melanie Rieback, CEO/Co-founder of Radically Open Security, NL
If you would like to learn more about being safe and resilient against cyber threats, watch the recording from the webinar we did on June 22, 2021,
led by Melanie Rieback and one of her ethical hackers, Stefan Marsiske.
Dominika Uzar | 1 min read | Jun 24, 2021
Major dangers and media manipulation threats in the age of disinformation
Michal Prawdzik | 1 min read | May 24, 2021
Manipulation, coercion, and preying on emotions – all have been a part of human existence probably since the very beginning. Naturally, some people are doing it better than others, and those at the other side of the equation, tend to fall victim to such schemes, and are left faced with the consequences of their often unassuming nature.
Goce Arsovski | 7 min read | Apr 9, 2021
The growing trend of state institutions of providing more electronic services to citizens besides requiring consistent monitoring of technological development, advancing knowledge and changing the habits of citizens also requires precise determination of measure for the protection of citizens' personal data
Hive Mind | 5 min read | Mar 16, 2021
How many times have you faced the embarrassing situation of forever losing your precious data such as photos, videos, etc.? All of this either due to a little carelessness or maybe not even your fault? Are you being careful by always keeping a safe copy of your most valuable data, or are you just relying on your usual antivirus software to protect you against ransomware attacks?
Goce Arsovski | 1 min read | Feb 18, 2021
Virtual Private Networks, also known as VPNs, are well known to our public as a very useful "tool" for circumventing the rules of certain streaming platforms regarding the geolocation constraints. Aside from "cheating" the service or platform, and making your favorite series, feature film, or podcast available, what else do we know about them? Can VPNs benefit us in other circumstances, professional or private, and why are they really important?
Goce Arsovski | 6 min read | Feb 8, 2021
Phishing messages, spam, junk, and a host of other names. We have all, at some point, received such messages. From the infamous e-mails from the Nigerian prince to the most sophisticated types of targeted phishing. The bad news is: they are here to stay. What can we do about it?
Goce Arsovski | 6 min read | Jan 18, 2021
We'd like to invite young people associated in non-governmental organizations, informal groups, dialogue bodies and activists acting on their own to free online training sessions on disinformation, recognizing it, preventing and counteracting its negative effects. The training is addressed to all those who understand the importance of disinformation in public life, who would like to learn more about the ways it works, get specific tools of recognition and methods of dealing with it. We also invite people who actively participate in public life (also at the local level) and therefore are most vulnerable to disinformation actions aimed at undermining their credibility and the trust of public opinion, necessary to effectively fight for the public good or the interests of the groups they represent.
Dominika Uzar | 2 min read | Dec 14, 2020
Guides, checklists, FAQs, reading lists and a debunk database
Mark Semoil | 1 min read | Jul 8, 2020