Covid and sex: charity issues guidance on reducing infection risk | The Guardian

Terrence Higgins Trust advocates face coverings and not using face-to-face positionsCoronavirus – latest updatesSee all our coronavirus coverageWearing face coverings, avoiding kissing and choosing positions where you are not face to face are among the recommendations from a leading sexual health charity to reduce the risk of catching coronavirus during sex.Publishing advice on managing the risk, the Terrence Higgins Trust said asking people to abstain indefinitely was not realistic and that people needed to find a way “to balance our need for sex and intimacy with the risks of the spread of Covid-19”. Continue reading…

Terrence Higgins Trust advocates face coverings and not using face-to-face positions

Wearing face coverings, avoiding kissing and choosing positions where you are not face to face are among the recommendations from a leading sexual health charity to reduce the risk of catching coronavirus during sex.

Publishing advice on managing the risk, the Terrence Higgins Trust said asking people to abstain indefinitely was not realistic and that people needed to find a way “to balance our need for sex and intimacy with the risks of the spread of Covid-19”.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more