Using the internet has become such an integral part of everybody’s life. In fact, anything that relies on the internet for communication, is connected to a computer or any type of smart device, can be affected by a cyber security breach. Do you have any sensitive information available online?

Think about it for a second!

Smartphones, tablets, e-mail providers, cloud services, IoT devices, government database servers, internet service providers, corporate database servers, banks, medical systems and social media platforms are examples of connected systems that have your personal information.

Your information is everywhere! Understand the value of it!

Let me introduce you to my definition of cyber security!

I divide cyber security into four sections that are tightly interwoven. 

Check them out below!


Security is why you have locks on your door. It is what keeps any prying eyes from accessing unauthorised areas of the internet, how your data stays safe and it tends to be technical.


Privacy is why you put curtains on your windows. It is about your right and ability to control who can access your personal identifiable information on the internet. Also called PII’s.


Safety focuses on behaviour and awareness. The main difference between security and safety is that safety aims to avoid accidents by awareness and security prevents criminal acts.


Anonymity is nobody knowing who you are, but potentially seeing what you do. Anonymity is the ability to not link your activities and actions with your true identity.

Free Download

This free e-book guide gives you an introductory overview into the exciting world of cryptocurrencies!


The Beginners Guide To VPNs

Virtual Private Networks Online personal integrity is quickly becoming increasingly important to people. The ability to freely express opinions, avoid censorship and surveillance have been brought

The Online Privacy & Anonymity Guide

Privacy Laws Makes All The Difference If you are worried about your online privacy and want to control what governments, businesses and intelligence agencies know

The Beginners Guide To Encryption

Encryption… ..singlehandedly is the best tool anyone can use to protect their data. Even if you could apply every thinkable computer security measure but still

Computer Security Guide For High Value Targets

This guide aims to provide non-technical information about computer security with solutions that provide high level of security without sacrificing the convenience necessary for an

How To Wipe A Computer

This guide will show you how to completely wipe a computer. The guide assumes that you are using SSD disks but can also be applied

How To Secure A PC (Windows 10)

Windows based computers have a bad track record throughout history when it comes to security with a a lot of bugs and vulnerabilities. The fact

How To Secure A Mac

The process of increasing system security is called system hardening. Compared to Windows, the macOS is a more secure system out of the box simply

MacOS (Mojave) Optimisation Guide

This guide will show you how to maximise the performance of your Mac when you need it to perform its best during performances, presentations or


The Best VPN Of 2019

Express VPN delivers a textbook VPN service that meets all my requirements and expectations! 5/5 stars  5/5 Summary When taking a look at what

CleanMyMac X

CleanMyMac is a software that is right up my alley because i love to keep a tidy computer. There’s no greater feeling than throwing away