Your Partner Of Choice
Safe Blogging

What more we offer

skirts logo clear


Building more capacity around ICT and women empowerment.

SKIRTS aims at creating awareness on Technological Privacy on human rights. A lot of violation of one’s privacy takes place online and most individuals are not aware of these violations that exist whenever they engage on the online space.

So are working together with colleges and university in creating awareness so as women’s rights organizations and other like minded entities and individuals.

Our approach to outreach is simple;

We share our work and interest in creating safe online spaces for all with focus on women and girls. You can help by joining this movement of online safety by attending our digital security trainings that focus on preventative measures against online violence.

Also, you can help by spreading the news far and wide to help us capture as much data as possible on the penetration of online violence in Kenya. Share your story.

Next, you can join our community engagement activities to shed more light into the matter. This breeds solidarity and power to the people.


Using ICT as a tool in activism to map out different types of both online and offline violations/abuse of one’s privacy as a result of using TECH.

As the levels of Tech related violations are increasing, SKIRTS is collecting evidence to show demographically the different types of violations and to what extent they exist.

Through Research and  Data Collection,SKIRTS , will be able to:

  • Gain knowledge about the interconnections of violence against women and  ICTs,
  • To show the evidence on different forms of incidences of violence against women, where they occur, and what forms of support are available.

This data will be shared with key stakeholders for advocacy campaigns to lobby for policy changes that increase access to information,  protection from harassment, communication resources, and expand communication rights

The Data Collected both Online and Offline, will also aids in identifying Training needs.


Through creating awareness on how ICTs are connected to violence against women.

SKIRTS aims at building a community to strategize around eliminating violence against women through digital platforms. By engaging people and key stakeholders in conversations revolving around this issue, and  implementation of strategies that strengthen women’s participation in ICT policy processes

skirts logo clear


Online is the new front line. We shop online. We work online. We play online. We live online. More and more, our lives depend on online, digital services. Almost everything can be done online from shopping and banking to socialising and all of this makes the internet, also known as online spaces (cyberspace). We often do this without stopping to think about the security issues that might be involved.

As S.K.I.R.T.S. offer training with focus on digital Security as a means of creating awareness around cyber security threats. With focus in universities, colleges, CSO’s, organizations and associations. We seek to equip people the with skills and tactics on how to take charge of their online presence, and steps in which individuals can take to represent themselves online.

skirts logo clear


We are all SOCIAL and the internet helps us to connect globally with everyone whether we know them or not. This availability of connecting with everyone can either work for you or against you. For example; your online postings can secure you an amazing career opportunity if you use it right to express your passion on certain global issues. At the same time, internet availability can work against you and that is SKIRTS roles to REDEFINE TECH for you.

Having social media accounts proves your existence, character and personality; on a bad day, you happen to post a harsh comment and this gets replicated in multiple locations on the internet. What do you do? It’s important to ensure that your digital footprints are a clear representative of who you are and how you want the rest of the world to view you.

Knowing your online trail makes you in charge of your online safety and you can easily explain different contents based on the context that was used.Digital footprints stakes get higher for women and girls in terms data manipulation, stalking and defrauding. In a society that’s highly patriarchal, it’s wise to have some tricks up your sleeve in order to protect yourself as female species on the image you want to portray to the world. Remember: You are only in charge of what you say, how its portrayed by others is out of your scope, so ensure you express yourself adequately online and be in charge of your words.

skirts logo clear


A friend of mine expressed his concern on the amount of passwords that we all have to manage today. There are bank passwords in relation to internet banking, mobile money, work emails, personal emails, subscription websites,online learning, social media accounts which are like five per person etc. So how do you ensure that you do not replicate the same password across all accounts?

It’s tricky,right? Given that you have a life to live, a family to take care of, a job to do and friends to catch up with. How then do you let password nightmare get into your way? Someone once said, that you choose the most memorable work and then tweak it across all platform, easy to remember right?

Another friend said that it doesn’t matter, you can let google chrome save it for you so that it helps you to remember.

Let me share a scenario with you; A young lady called “Jane” secured a dream job at HQ corporations.With a vibrant lifestyle and a top of the game online personality and offline too obviously) She happened to be using one password across all the online platforms she signed up to.

Upon a bad break up in her personal life, her workmates soon got to know of her private innuendos all because of using a single password that’s easy to guess by someone who’s close to you or even through social engineering.

Lave a look at all your email communication patterns and the number of people you connect with and how they can be affected by a tarnished reputation via a hacked account. Check out and connect the dots with all the other accounts that connected to your email and then deduce how much is at skate wth poor password management.

There are free and open source tools that you can adopt in order to improve your password management skills, this is a more preventative approach to digital security. No dedicated policies and laws in Kenya are in place that will help you hold your perpetrator accountable to infringing your online privacy.

Contact us if you need help with password management, we will help you set up an easy to use password manager. Also continue to go through our website for more tips and tricks to effective online privacy and safety.

skirts logo clear


Research says a lot in terms of gendered online communications and science says that females are more SOCIAL therefore it’s important to know how to manage all your social networking platforms.

Safe Blogging

Blogging is a powerful tool, it creates jobs to hundreds of thousands of people worldwide.It also helps improve self esteem since you have a voice and you are confortable expressing that voice. It’s easy to get caught up in the thrill of blogging and post content that might put you in trouble.

Women and girls who are vocal and not afraid of voicing their opinions can easily fall prey of blogging attacks. Due to the nature of our society it’s very easy to victimize a female for openly expressing their thoughts on sensitive issues like religion, politics and or gender. How then can we use safe blogging to REDEFINE TECH SPACES for more women and girls?

As SKIRTS we came up with five go to points on safe blogging. You are free to add more tips in the comment section below.

  1. i) Consider using a pseudonym (fake name) so that you protect your offline identity. This works best for everyone who is vocal but especially female bloggers because most of the time, your blog posts will be judged based on your gender and not on the context that inspired you to write.
  2. ii) Be careful about the private feelings you share online; most stalkers invest a lot of time to read our patterns and master your habits. If you are  used to expressing everything raw online then you are giving everything away and this gives your abuser more power to manipulate you.

iii) This point goes hand in hand with private feelings. Ensure you do not post anything that might embarrass you in the later on. I know a lot of people have gotten “success”via rising above their online embarrassment but note that people are different and reactions are also different. Trying to cause a scandal for online presence may of may not work for you. So always go through all the available options before you click post.

  1. iv) Periodically, view who has access to your site and make changes if possible. By sharing control panel access to your blog by other people might be a good thing in terms of efficiency in posting but if not controlled with clear policy, this right can be abused. Restrict the number to few people and ensure that the password is also updated frequently just in case a third party gets access and posts defaming posts.
  2. v) If blogging is your forte and a release mechanism of all life’s hurdles, then go for it and enjoy it. Have fun and impact while blogging.

WebCam Blackmail

This is super common amongst young women and girls. With the desire of wanting to connect, video chats plays a huge role in making the experience almost a reality. Seeing each other via TECH devices is an amazing feeling, it makes up for lost words and you are able to tell the status the other person is at via reading the nonverbal cues.

In terms of online chats via webcam, it gets tricky since you cannot tell whether the other person is recording you or not. The conversation can take a wrong turn and lead to blackmail since you ended up sharing private moments online.

Cases of online blackmails is very common in Kenya but unfortunately there is no law in place yet to help victims press charges and get the criminals behind bars. Currently, the penal code is the best legislative option to use but then it’s too broad to categorize online violence in it.

The Kenyan police have also been sensitized on online violence, therefore,it’s relatively easy to press charges against an abuser.

Have Questions?

Protecting yourself from malware

Malware is defined as software designed and distributed to gain unauthorised access to computers and other connected devices, disrupt their normal operation, gather sensitive or confidential information or spy on the device’s user(s).

Creating strong passwords

With so much of our lives happening in a digital environment, building up an impressive array of passwords is inevitable. Passwords provide only a single factor of authentication, and password cracking tools have been developed that can easily decode simple passwords that have been encrypted.

How to use user access control

Do you know what your team members can access?  Controlling access to your key systems and data is crucial to protecting your business and customers.  This will be one of the five control areas covered in Cyber Essentials.

Reporting online crime

If you or someone else is in immediate danger or risk of harm report to the national reporting point for fraud in Kenya. You can submit reports to Action Fraud either online or by phone.