top of page

REQUIREMENTS

  • Easy to use and understand.

  • Be able to detect potential cyber security threats.

  • Be interactive.

  • Be educational.

  • Be able to use on multiple devices.

  • Be compatible with any operating system.

  • Be usable for all users, including users with disabilities.

  • Be compatible with different web browsers.

bottom of page