Editorial Policy
ConfamTips is committed to publishing cybersecurity content that is accurate, independent, and genuinely useful to Africans protecting themselves and their businesses online. This policy explains exactly how we research, write, verify, and update everything we publish.
Our Editorial Mission
ConfamTips exists to make cybersecurity knowledge accessible to every African — regardless of technical background, income, or location. We believe that the gap between those who understand digital threats and those who do not is not just an inconvenience — it is a genuine risk to people’s money, privacy, and livelihoods.
Our editorial mission is to bridge that gap with content that is technically accurate, locally relevant, and plainly written. We do not publish content to fill a content calendar. We publish content because it helps someone stay safer online.
Every article, guide, review, and alert published on ConfamTips is held to this standard: if a first-time reader in Lagos, Accra, or Nairobi reads it and walks away more protected than before, it belongs on this site. If it does not meet that bar, it does not get published.
Who Writes Our Content
All content published on ConfamTips is written or reviewed by individuals with verifiable cybersecurity or IT expertise. We do not publish content from anonymous authors, generic content mills, or AI-generated articles that have not been verified by a human expert.
Our contributors and staff writers include:
-
Certified Security Professionals Individuals holding certifications including CEH (Certified Ethical Hacker), CompTIA Security+, CISSP, or equivalent practical experience in cybersecurity roles.
-
IT Practitioners Working IT professionals with hands-on experience in network security, infrastructure, and incident response across African organisations.
-
Security Researchers Researchers who actively monitor threat landscapes targeting African users, financial systems, and business infrastructure.
-
Specialist Guest Contributors Occasionally we publish contributions from external experts. All guest content is reviewed by our editorial team before publication and authors must disclose their credentials and any conflicts of interest.
Every article displays the author’s name and a brief professional biography. We do not publish byline-free content except for official ConfamTips announcements and policy documents.
How We Research And Verify Content
Cybersecurity misinformation can cause real harm — it can lead people to believe they are protected when they are not, or panic over threats that do not affect them. We take our verification responsibility seriously.
-
Primary Sources First Where possible, we cite primary sources — official vendor advisories, government cybersecurity agency publications, peer-reviewed research, and direct technical analysis. We do not publish claims that cannot be traced to a verifiable source.
-
Technical Verification Security claims, vulnerability details, and threat descriptions are verified by at least one technically qualified team member before publication. We do not simply republish press releases or vendor marketing materials as fact.
-
Local Context Verification Claims about threats specific to African markets — telecom vulnerabilities, banking app security, local scam patterns — are verified against local sources including direct contacts within relevant institutions where possible.
-
Tool Testing Tools reviewed on ConfamTips are tested directly on devices and connections representative of African users — including testing VPNs on Nigerian, Ghanaian, and Kenyan connections where performance varies significantly from Western benchmarks.
Editorial Independence
ConfamTips maintains strict separation between editorial content and commercial relationships. No company, advertiser, or affiliate partner has any influence over our editorial decisions, ratings, recommendations, or coverage.
A company cannot pay to be reviewed, pay for a positive review, or pay to have a negative review removed. If we accept advertising or sponsorship from a security company, that relationship is disclosed clearly and does not affect our editorial coverage of their products.
Specific commitments we make to our readers:
-
No Paid Placements We do not publish sponsored articles disguised as independent reviews. Sponsored content is always clearly labelled as such.
-
No Review Manipulation Our tool ratings and recommendations are based solely on our testing and analysis. Negative findings are reported honestly even when we have an affiliate relationship with that tool.
-
Affiliate Disclosure When we link to a product or service using an affiliate link, we clearly disclose this on the page. Affiliate relationships do not influence our ratings or recommendations.
-
No Conflicts of Interest Our writers and reviewers disclose any personal or professional relationship with companies they cover. Content with potential conflicts of interest is reviewed by a second team member.
Our Threat Alert Standards
Threat alerts require a higher standard of care than general educational content because they can prompt immediate action from readers. Publishing a false alarm erodes trust. Failing to publish a real threat puts readers at risk. We apply the following standards to all threat alert content:
-
Verified Before Published We do not publish threat alerts based on unverified social media reports. Every alert must be traceable to a credible source — a security researcher, official advisory, or direct technical evidence.
-
Scope Is Clearly Stated We clearly state who is affected, what geography is impacted, and what the actual risk level is. We do not use sensationalist language to inflate the severity of threats for traffic.
-
Actionable Guidance Included Every threat alert includes specific steps readers can take to protect themselves. An alert without actionable guidance is incomplete.
-
Updated As Situations Develop Threat alerts are updated when new information becomes available. The date of the most recent update is displayed prominently on all alert articles.
Corrections And Updates Policy
We make mistakes. When we do, we correct them promptly and transparently. Our corrections policy is:
-
Minor Corrections Typographical errors, broken links, and minor factual inaccuracies are corrected silently within 24 hours of being identified.
-
Significant Corrections If a materially incorrect security claim is corrected — for example, a vulnerability description that was inaccurate — a correction notice is added to the article noting what was changed and when.
-
Content Updates As cybersecurity evolves, older content may become outdated. We review high-traffic articles quarterly and add an “Updated” date when content is refreshed to reflect current information.
-
Reader-Reported Errors We welcome corrections from readers. If you believe something we have published is incorrect, contact us at editorial@confamtips.com with the article URL and the specific claim you believe is inaccurate. We respond to all correction requests within 48 hours.
Our Artificial Intelligence Policy
We do not publish AI-generated content as standalone articles. Given the critical nature of cybersecurity advice, content that has not been written or thoroughly reviewed by a qualified human expert is not acceptable on this platform.
We may use AI tools to assist with research, outline generation, and draft review — but all content published on ConfamTips is written, verified, and approved by human experts before it goes live. We will never publish an article that a qualified security professional has not personally reviewed for accuracy.
AI language models can generate plausible-sounding cybersecurity advice that is factually incorrect. In our domain, incorrect advice can lead someone to believe they are protected when they are not. We take that risk seriously enough to maintain a strict human-review requirement on all published content.
Editorial Contact
For questions about our editorial standards, correction requests, tip submissions, or press enquiries, contact our editorial team directly.
Reach Our Editorial Team
We respond to all editorial enquiries within 2 business days.
For urgent security tip submissions or vulnerability disclosures, email security@confamtips.com directly. We treat all responsible disclosure submissions with confidentiality.
This policy was last reviewed and updated in April 2026. It is reviewed annually or whenever significant changes to our editorial practices occur.
