Education Portal
Safety through Education

Education Portal
The Technology Safe Online Education & Learning Portal is a secure, on-demand training platform with 150+ bite-size and in-depth courses designed to help victim-survivors of domestic and family violence (and the organisations that support them) understand technology abuse and learn practical steps to stay safe online and offline.
Phones, apps, cloud accounts, trackers, and smart-home devices can be misused to monitor, intimidate, or control. Understanding common tactics makes the invisible visible. Through our courses we victim survivors are empowered to understand the signs of technology abuse and coercive control, and take the action required to prevent it.
Tailored for:
-
Victim-survivors seeking clear, non-technical guidance to protect privacy, devices, accounts, and routines
-
Support services (refuges, casework, outreach, legal/health/education) building team capability
-
Friends & family supporting someone at risk and needing simple, safe advice
Technology Safe also offers Support Services Training and Victim Survivor Training.

100+
Sesisons deliviered
3k+
Attendees Participated
4k+
Hours of Education
98%
Feel more confident
Early detection prevents escalation
Knowing red flags (e.g., unknown logins, sudden battery/data spikes, location “coincidences,” unfamiliar Bluetooth devices) helps people act before digital abuse turns into greater harm.
Privacy and safety are restored
Training shows how to secure accounts (strong passwords, MFA, recovery resets), lock down phones and computers, and stop unwanted location sharing and reducing immediate risk.
Safer daily routines
Survivors learn practical habits: safe contact plans, lock-screen privacy, quick-exit strategies, social media hygiene, and how to handle tracker alerts or car/telematics access.
Informed choices about devices
Guidance on “preserve vs. clean vs. replace” avoids destroying potential evidence and helps pick the safest path in each situation.
Protection for children and supporters
Training covers kids’ devices, co-parenting apps, and what friends/family should and shouldn’t share, reducing accidental leaks of sensitive information.
Residential
Providing peace of mind by ensuring personal conversations, activities, and sensitive information remain secure within your private space.
Commercial
Securing boardrooms, offices, and sensitive areas, businesses can protect confidential information, maintain competitive advantage, and ensure regulatory compliance.
Support Services
Detecting and removing covert surveillance that may be being used to monitor, control, or intimidate a victim, ensuring their safety and privacy.
Courses we offer:
Recognising Technology-Facilitated Abuse
-
Identify how phones, apps, cloud accounts, trackers, smart-home devices, and computers can be misused to monitor, intimidate, or control.
Device Triage (Non-Forensic)
-
Safely check phones/tablets/computers for common compromise without destroying evidence. Review permissions, Device Admin/MDM, accessibility abuse, unknown profiles, shady VPNs/certificates.
-
Remove risky apps/permissions, disable notification previews, log out of unused sessions.
-
You find strong indicators of stalkerware or tampered hardware
Account Security & Takeover Prevention
-
Regain control of email, cloud, social, bank, and carrier accounts. Rotate passwords/recovery info, enable MFA, revoke OAuth tokens, end unknown sessions, review forwarding rules.
-
Change recovery phone/email first, then passwords; turn on MFA; check “trusted devices.”
Location, Tracking & Routine Protection
-
Manage Find My/Google Location, Family Sharing, car/telematics apps; handle Bluetooth tracker alerts (AirTag/Tile); plan safer travel and check-ins.
-
Turn off unsafe sharing; audit paired Bluetooth devices; review vehicle app access; move parking to lit/CCTV areas.
Safer Communications & “Quick-Exit” Strategies
-
Choose safer messaging, set lock-screen privacy, use code words, create safe contact plans, clear call/SMS forwarding.
Social Media, OSINT & Image-Based Abuse
-
Lock down profiles, remove geotags, manage friend/follower lists, handle impersonation, report and remove intimate-image abuse
Cloud, Shared Devices & Smart-Home Safety
-
Close “silent leaks” via shared albums/calendars/backups; reset and securely recommission cameras, doorbells, locks, speakers, and hubs; review access logs.
Evidence-Aware Documentation
-
Keep options open for legal steps: safe logging, screenshots, timelines, chain-of-custody basics; decide when to preserve/clean/replace.
Financial Abuse & Identity Safety Online
-
Protect banking/email, set strong MFA (authenticator keys), secure recovery tokens, recognise scams and account-takeover attempts.
Safety Tech 101 (Wearables & Apps)
-
Choose and discreetly set up duress watches/cards/apps; agree who gets alerts and how responders act.
Home & Vehicle Basics for Survivors
-
Quick home wins (locks, lighting, sightlines, safe-room setup), visitor rules, car-safety habits





Counter Surveillance
Sweeps to detect and remove hidden cameras, listening devices, GPS trackers, and digital spyware used for unauthorized monitoring. Our expert services ensure your home, vehicle, and personal technology remain secure, protecting your privacy and peace of mind.

Property Safety
Thorough evaluation of your home, business, or facility to identify potential security risks, vulnerabilities, and safety hazards. Our expert team provides tailored recommendations to enhance overall safety, prevent unauthorized access, and ensure a secure environment for occupants and assets.



