Indonesian

Archives: Articles

Privacy

Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people. 

Safe Linux Use

This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations. It includes advice for people running individual Linux workstations (for example, home or small business users).

Viruses & Spyware

Many people believe that smartphones and tablets are not susceptible to viruses, spyware and other malware. This is certainly not the case … in fact the more people that use these devices, and the more apps that are available for them, the greater the level of harmful and criminal activity.

Physical Security

Physical security is just as important as online security in protecting your smartphone or tablet – and yourself – against crime. The compact size of these devices makes them particularly vulnerable to theft, and accidental loss or damage.

Computer Use in Public Places

Using computers, smartphones or tablets in public places is now as commonplace as using them at home or in the office.  Whether using your own device – or computers found in internet cafés and libraries – there can be a number of risks if you do not take proper care. 

Preventing Identity Theft

Identity theft is a method used to carry out criminal activity, involving unauthorised use of your name and personal details to either steal from you, or commit a crime in your name. Identity theft can be carried out either online, physically using printed documents, or by a combination of the two. 

Safe Mac Use

Apple Macs are less vulnerable to attack by malware than PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs  has increased for both personal and business use, so has the malicious activity directed against them as criminals will […]

Online Gaming

Many computer games are played online against other players over the internet, whether on a console, computer, mobile device or via social networking sites. Most play using an assumed identity, so you are generally already unaware of who they really are.  There can also be hidden financial risks in downloading and playing web and app-based […]

Safe Computer Disposal

Computers that you no longer need should be disposed of with great care. The data on your computer can easily be accessed whether you sell, scrap, give away or donate it, and even ‘deleted’ data can be retrieved with relative ease by criminals. 

Skype & Other Video Calls

Internet video or voice (VoIP) calls are very inexpensive and convenient, and especially useful for online meetings between two or more parties who cannot – or do not wish to – attend face-to-face meetings, seminars, training sessions and the like. They use your internet connect to make and receive calls.