Search Results

Filter
  • POST

    Digital Resilience: Strengthening the Capabilities of African NGOs and Charity Organisations

    This article will provide practical tips and tricks for digital resilience, highlighting the importance of digital security for NGOs and charity organizations in Africa.Best Practices for Data SecurityOne of the key components of digital resilience i...
    06-02-2023
  • POST

    Webinar - Digital Security best practices for Civil Society Organisations

    This session covers digital security terminologies, how to identify digital security threats, how to prevent digital security attacks, how to maintain digital safety and security and how to respond to digital security attacks.Watch webinar here
    26-01-2023
  • POST

    Digital Rights – What Are They? Why Are They Important? How Can I Ensure I Have Them?

    According to Statista​ ​the number of internet users globally will grow to 5.3 billion by 2023, which is more than 50% of the world population. The compound annual growth rate for the whole period from 2018 to 2023 is six percent. The fastest expecte...
    16-01-2023
  • POST

    Launch of WACSI Node Nigeria

    Despite the important role the third sector plays, civil society actors face several constraints that weaken their prowess to pursue their mandates as agents of national development and democracy.Some of these challenges, include lack of access to af...
    21-12-2022
  • POST

    Combating Disinformation Project Case Study from Colnodo

    Starting PointColnodo, after working in different areas of Colombia, recognized the need to address mothers, fathers, and caregivers as one of its target populations since minors, that is, the children of this population are among the most vulnerable...
    20-12-2022
  • POST

    Learn how to recognize and avoid Social Engineering Attacks

    Cyber threats are not something new, however, it is important to recognize them and become familiar with them in order to understand the logic behind each of them and be able to prevent them, and know how to denounce and act against them.What is Soci...
    01-09-2022
  • POST

    Challenges for "likes" or death.

    The internet has served as a tool to make us feel more interconnected. Distances are shorter, information is more accessible, knowledge is no longer a privilege, and social life as we knew it, has become virtual. In this sense, social networks have b...
    01-08-2022
  • POST

    Email Security Protocols for CSOs

    As an IT administrator, I have seen a lot of users fall prey to malware they could have easily avoided. But how do you avoid something you have zero knowledge about? Mail server administrators should not be the only ones with knowledge on how to use...
    07-06-2022
  • POST

    How to be a responsible digital parent in the age of sharenting?

    From this post you’ll learn how to be a responsible parent also in the online world, and how to respect your child’s privacy.Photo: pexels.comWhat is sharenting and why does it matter?The international literature calls it sharenting, a phenomenon whe...
    01-06-2022
  • POST

    4 Types of Phishing Attacks

    One of the most frustrating things about phishing is that most people know what it is and how it works, but many still get caught.Phishing (pronounced: fishing) is an attack that attempts to steal your money, data, or your identity, by getting you to...
    25-05-2022
First Page Previous Page 1 ... 8 9 10 11 12 13 ... 16 Next Page Last Page