Site logo
Sticky header logo
Site logo
Sticky header logo
Mobile logo
info@saferinternetsouthafrica.co.za
  • Safe Browsing
  • Social Media Guides
  • Inappropriate Exposure
  • Online Communication
  • Technology, Games & Devices
  • Digital Security
  • Cyber Bullying
  • Safe Resources
  • Parental Advice
  • Teacher Advice
  • About
  • Contact
Safer Schools (Pty) Ltd

Cyber Security

Cyber Security We are Losing the Cyber Crime World War
August 7, 2017in Cyber Security 0 Comments 0 Likes

We are Losing the Cyber Crime World War

In the last decade, as we conduct more and more of our lives and processes online, digital security has become a major concern for national defense. But according to a

Cyber Security Cybersecurity – FPB
May 30, 2017in Cyber Security 0 Comments 0 Likes

Cybersecurity – FPB

Cyber security is defined to cover physical protection (both hardware and software) of personal information and technology resources from unauthorized access gained via technological means. In contrast, most of the

Cyber Security Cyberstalking – FPB
May 29, 2017in Cyber Security 0 Comments 0 Likes

Cyberstalking – FPB

Cyber stalking is just like stalking in real life, as people can stalk you in the cyber world as well. What is cyberstalking? A cyber stalker harasses his or her

Cyber Security Objectionable Content – FPB
May 26, 2017in Cyber Security 0 Comments 0 Likes

Objectionable Content – FPB

Online, you can be exposed to material that is inappropriate or even harmful to you, whether you are a child or an adult. It could be through material that is

Cyber Security Cybersafety – FPB
May 26, 2017in Cyber Security 0 Comments 0 Likes

Cybersafety – FPB

Whereas cyber ethics focuses on the ability to act ethically and legally, cyber safety addresses the ability to act in a safe and responsible manner on the internet and in

Cyber Security Cyber security 101 for children
April 13, 2017in Cyber Security 0 Comments 0 Likes

Cyber security 101 for children

For children and adults alike, the Internet is a place of endless fun, learning, talking and playing. But, like anything else in life, there are some basic rules that children

Cyber Security Is Identity Theft a Reality for Children?
April 13, 2017in Cyber Security 0 Comments 0 Likes

Is Identity Theft a Reality for Children?

How children are becoming online identity theft victims. Around 1.3 million children have their identities stolen every year, half of these children being younger than 6. Criminals are always on

Counter mail

0 fans
Like

Categories

Recent posts

Exams: Go Online and you’ll be Fine
Exams: Go Online and you’ll be Fine
23.10.2017 0 5
Suicide Help
Suicide Help
23.10.2017 0 1
Shining the Dark Spotlight on Sexual Assault in Schools
Shining the Dark Spotlight on Sexual Assault in Schools
23.10.2017 0 0
Don’t Take the Catfishing Bait
Don’t Take the Catfishing Bait
23.10.2017 0 1
Teen Suicide: A Whale of a Problem
Teen Suicide: A Whale of a Problem
23.10.2017 0 0
Load more

About us

HQ Details
293, Dunkeld West Centre, Cnr Jan Smuts & Bompas Rd,
Call
+27 82 377 6547

Search

In Collaboration with the FPB

Terms and Conditions

Recent Posts

Exams: Go Online and you’ll be Fine
Exams: Go Online and you’ll be Fine
23.10.2017
Suicide Help
Suicide Help
23.10.2017
Shining the Dark Spotlight on Sexual Assault in Schools
Shining the Dark Spotlight on Sexual Assault in Schools
23.10.2017
© Safer Schools 2017 / In Collaboration with the FPB
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://saferinternetsouthafrica.co.za/wp-content/uploads/2017/03/SISA-background.jpg);background-size: cover;background-position: center center;background-attachment: fixed;background-repeat: no-repeat;}#stuning-header div.page-title-inner {min-height: 620px;}div#stuning-header .dfd-stuning-header-bg-container.dfd_stun_header_vertical_parallax {-webkit-transform: -webkit-translate3d(0,0,0) !important;-moz-transform: -moz-translate3d(0,0,0) !important;-ms-transform: -ms-translate3d(0,0,0) !important;-o-transform: -o-translate3d(0,0,0) !important;transform: translate3d(0,0,0) !important;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}