Ensuring privacy and security online is not easy, so we created this course on email security and privacy to enrich the knowledge and awareness of our users.

Protect your data
Securing your data is the first step in protecting your digital life, so don’t hesitate to take action.

Protect your device
Protecting your device is the second and most important step. Therefore, you must understand that your device is the gateway to your digital life. The more secure it is, the more effective your security measures will be.

Secure your email account
Protecting your email account means protecting your online identity, as your email address is linked to almost everything you do online.

Bad password habits
Keeping up good password habits is key to bolstering all of your online and offline defenses. Of course, there are password managers that do a great job. However, avoiding bad password habits is something you have to do yourself.

11 practical password tips
Once you’ve broken bad password habits, here are 11 best practices to implement to make sure your passwords are strong.

Social engineering
People are considered the weakest link in any kind of defense. What makes us vulnerable is the tendency to trust someone or something based on certain criteria. This section briefly describes different types of social engineering.

What is social engineering?

Social engineering is a group of techniques used by cybercriminals that exploit human nature and trick people into doing something that will compromise their security.

Social engineering: what is Tailgating?

Tailgating is a social engineering technique in which a person tries to enter an area where they are not normally allowed to enter, usually by following someone behind.

Social engineering: Quid Pro Quo attacks

Sometimes, bad actors can make you think they are doing you a favor that you should return. But whether you voluntarily give them your sensitive data or not, they can always use it to steal money and additional data.

Tips to avoid social engineering schemes