CategoryReading Room

The is where we post our essay style content for a longer read and analysis of a certain subject matter

Encryption 101

E

It’s time for another instalment of our 101 series where we explain concepts and tools related to privacy and security in an introductory format and in plain English, avoiding all the technical jargon. Today we look at encryption!

Cookies 101: Cookie Management

C

Many websites you visit tell you they use cookies and ask you to accept this before you’re allowed to browse the website. What exactly are they and what do they do? Are they a privacy risk? Let’s find out.

Internet of Things (IoT) 101

I

We continue our 101 series of simplified introductions to privacy related concepts or issues. Today we dive into the Internet of Things (IoT) and see how this is changing the way we interact and behave whilst considering the risks.

Crisis Surveillance

C

The fight to contain COVID-19 has introduced new powers of surveillance to governments around the world in a bid to contact trace. Whilst the public is mostly accepting this moral obligation, what are the lasting impacts for privacy after COVID-19 is behind us?

Virtual Private Network (VPN) 101

V

Our 101 series of introductions into key concepts relating to protecting privacy continues today. VPNs are considered the go-to for the privacy conscious with many advantages and few disadvantages. If you only do one thing to protect your privacy, using a quality VPN should be that one thing.

The less obvious ways bad actors can access your data

T

In some of recent articles we’ve mentioned that we don’t always know who has it in for us, an ex-partner, current or former colleague, someone we’ve wronged without knowing and so forth. Indeed, it doesn’t always have to be a stranger we’ve never met sitting at a computer on another continent doing us harm. Today we look at other sources of leaks that we rarely consider, and which can be closer to home than the obvious ones we traditionally suspect.

Challenging the way you imagine Data & Privacy

C

In this piece we consider the traditional way most people view data and privacy and hope to challenge it by aligning those concepts to simple items most people would have on their desk! It’s the first step in a journey to break down the technologically rooted definitions or dull images we form in our minds when our learning of such concepts comes from traditional research.

Phishing 101

P

Another instalment in our 101 series introducing key concepts in the online security and privacy protection space. Today we look at phishing – one of the biggest scams used today and one of the hardest to recognise.

Security Fatigue

S

There are two issues driving the existence of Privacy Rightfully, first we recognise people do want to take precautions to safeguard their privacy, security, and personal data. The problem is though they simply know how to do actually do that, so we want to provide the education to enable those skills. The second is what is known as ‘Security Fatigue’ which we’re diving into in this article.

Recent Posts

Contact us

SUBSCRIBE TO OUR NEWSLETTER

* = required field
I am over 18 years of age