Jun 29

3.3. Email

Electronic mail (email or e-mail) is a method of exchanging messages (“mail”) between people using electronic devices. It is like traditional mail, but it also has some key differences.  For example: Traditional mail is addressed with the recipient ‘s name, street, address, city, state or province and zip code. E-mails are delivered electronically across the Internet. An e-mail […]

Read More
Jun 29

3.4. Social networks

A social network is defined as a chain of individuals and their personal connections. Alternatively referred to as a virtual community or profile site, a social network is a website that brings people together to talk, share ideas and interests, or make new friends. This type of collaboration and sharing is known as social media. […]

Read More
Jun 29

3.5. Websites development, blogging and marketing

Websites are without doubt the most important element of the internet, enabling content such as texts, images, and videos to be displayed on the internet. The central page of a website is called home page, or start page/index page. The user then delves into the site’s subpages. Depending on the size of the website, site visitors […]

Read More
Jun 29

3.6. Personal Storytelling

Storytelling is the ability to captivate someone or a group of people with an engaging narrative that influences them and makes them feel like they were a part of the story. People remember stories much better than facts and figures. It is one of the most important skills you can learn to master. Key points: Storytelling influences […]

Read More
Jun 29

3.7. Security software

Any connected device may be a gateway for a security threat. The best way to secure a device, especially one connected to the internet, is to use proper and up to date security software, usually known as antivirus.  Extra layer of personal data security and both to the information transferred over the internet or the […]

Read More
Jun 29

3.8. Physical device security and hardware

We all know how annoying it is to lose a phone, get it stolen or simply drop it on the ground and get its screen broken to a level the device becomes unusable. The issue is usually not considered as important until it happens. In order to avoid all sorts of damage to a device […]

Read More
Jun 29

3.9. Internet of things (IoT)

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. This new wave of connectivity is going beyond laptops and smartphones, it’s going towards connected cars, […]

Read More
Jun 29

4.1. Privacy breaches and theft of data

What is data privacy breach? A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. A privacy breach occurs when someone accesses information without permission. It starts with a security […]

Read More
Jun 29

4.2. Hacking and cyber extortion

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose. Cyber extortion is an internet crime in which someone holds electronic files or your business data hostage until you pay […]

Read More
Jun 29

4.3. Identity thefts

Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation. Identity theft occurs when […]

Read More