privacy

share

What kind of risk are you taking when adding strangers to your online account? How many people are on your social networking friend list? Do you really know every single one of them personally? Would you talk to them in person? Be careful who you trust online – a person could always pretend to be someone they are not. 

 

share

Cyber bullying occurs when the internet or mobile phones are used to send mean and threatening messages in a deliberate, repeated and hostile manner. Cyberbullying has been a major concern in Brunei, as it is common for people to vent their anger or frustration though social networks. Most cyber bullies are motivated by jealousy, anger, revenge or frustration. Many do it for their own entertainment or to get a reaction.  

share

There used to be a time when shopping on the internet was very rare and uncommon, but thanks to the emergence of Facebook and Instagram e-shops, Bruneians have now learned to gain trust in making purchases with the click of a mouse, whether for clothing, electronics or car parts. While this has proven to be convenient, there are also risks involved with online shopping and people should be aware of them. 

 

share

 

It’s common in Brunei for people to catch up on social news by reading local blogs on a daily basis. Blogs (short for web logs) are online journals that are usually set up to share opinions, photos, information and more. Blogs may be set up by individuals or companies. 

 

share

The popular use of online communications has given rise to online sexual predators who come up with creative ways to take advantage of unsuspecting men, women and teens. These predators use various methods to seduce or pressure a victim to perform sexual favors, and often threaten the victim with embarrassment if they don’t do it. 

 

share

 

Passwords are the first line of defense to keep other people out of your computer, mobile phone, data and online accounts and this is why we must learn how to create strong passwords to protect ourselves. Unfortunately, many of the passwords people use are short and simple or have been used for a long period of time and for multiple accounts. Think of your password like a house key – it enables you to lock up your house, but you have to keep the key in a safe location. 

 

Basic guide to creating strong passwords 

Pages