Dolapo lost her phone last week. The phone contains the video of an AGA sponsors’ private meeting. She didn't use a password on her phone, which means that someone could easily access her data and put her at risk. However, she can still delete the contents on the phone so that the thief can’t access any information.
Nasir has been working on investigating AGA. He has gathered lots of evidence and saved it on his computer. Few days before giving his presentation to his editor in chief his computer crashed and he has lost all his documents and project. He could have backed the documents up before the computer crashed.
Dolapo is at Nasir’s office, giving them a talk about password safety. Many of Nasir’s co-workers have admitted either forgetting their passwords or even having their accounts hacked. So Dolapo is telling them about Password Managers.
Dolapo is reading the online list of board members and sponsors of ABA. But she also has to be careful like Nasir. She browses on Firefox, but when she does, she goes on Private Browsing.
Dolapo often finds herself in the midst of protests. She's been detained a few times, and in the course of her work is constantly losing her phone. Fortunately, before she didn't have any sensitive data on any of them, but now, She has to store important information on her phone. She needs to know how to protect her data.
Chidinma works in an NGO and needs to print some confidential data for internal use but their printer doesn't work so she prints it out of the office. She printed the data from a flash drive and when finished, deleted the files from the drive, then also from the recycle bin. She thought by emptying the flash drive she had gotten rid of the data. She was wrong.
Nasir was covering a protest in Ibadan when he lost his iPhone. He has some videos and documents connected to AGA group which he can't let anyone get access to. He wants to know how he can remotely Erase his Data.
Chidinma is travelling for a three day conference in Port-Harcourt and she has to ensure that all her devices are protected while on this trip. These tips would guide her.
There's an ongoing renovation at the office, but Nasir has got to work. He finds himself floating from one Internet cafe to the other everyday to avoid establishing a routine. He also doesn't want anyone to track his activity, either, so he wipes his browsing history from all public computers he uses. Here's how he does it.
Nasir is on his way to the office, but he wants to stop by at a friend’s office. He gets a text from Dolapo informing him to check his email immediately and perhaps copy some information from a website. This can be a problem because anyone else who will have access to the computer can check his browsing history and see what he did online. If he goes into incognito mode, then anybody checking what he has been doing online will not find anything. So, what is incognito mode all about?