Wales

General Protection

Virtual Private Networks (VPNs)

Virtual Private Networks all perform the same basic service: providing end-to-end encryption for any data sent through them. This encryption does not stop your data from being intercepted … but merely means that the person...

Victim Support

Being a victim of any cybercrime – be it fraud or personal identity theft to online abuse, stalking or paedophilia – can be a difficult and frightening thing to deal with, especially as the identity of the perpetrator is...

Digital Legacies

When people die, they leave their physical assets and money to beneficiaries who could be family members, friends or acquaintances or favourite charities. This is arranged beforehand by making a will or – if there is no will...

Accepting Terms & Conditions

When using the internet, you are frequently required to accept Terms & Conditions before proceeding with shopping, banking, downloading and other tasks....

Privacy

Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people....

Passwords

Your passwords are the most common way to prove your identity when using websites, email accounts and your computer itself (via User Accounts). The use of strong passwords is therefore essential in order to protect your security...

Safe Internet Use

The internet has revolutionised the way we live our lives – enabling us to read the news, enjoy entertainment, carry out research, book our holidays, buy and sell, shop, network, learn, bank and carry out many other everyday...

In partnership with