fbpx

Destiny Young

Destiny Young is a highly credentialed information technology professional with over 15 years of industry experience. An HND, BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a first-class MSc degree in Digital Transformation and currently pursuing another MSc in Computer Science and Information Technology with a specialization in Cybersecurity at Paul University, Awka, Anambra State. His professional development centres around Cybersecurity and Digital Transformation. He is a Chartered IT Practitioner, Manager, and Administrator with professional membership of Computer Professional Registration Council of Nigeria (CPN), the Nigeria Computer Society, the Chartered Institute of Administration of Nigeria (CIA), the Nigerian Institute of Management (Chartered) and a host of others.
319 POSTS
7 COMMENTS

CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE NECESSARY

The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.

Implementing ISO 27001 Information Security Management: The Processes

ISO/IEC 27001 helps you implement a robust approach to managing information security (infosec) and building cyber resilience within organisation.

Data Privacy: the need for compliance with NDPR

Cyber security threat landscape has grown exponential in recent years, with hackers using sophisticated technology to compromise networks and users.

NIN verification using your NIN slip will no longer acceptable, use Virtual NIN

International Standard Organisation (ISO) 270001 Information Security Management System (ISMS) requires that organisations assess information security risks, put in place robust security controls and...

CYBERSECURITY ALERT: DON’T RUSH TO OPEN THAT IMAGE, VIDEO OR MUSIC FILE SENT TO YOU VIA WHATSAPP

Please note, hackers use the technique called Steganography to deliver virus into your device and attack you.

Facebook Creator and Monetisation: I hope this explanation helps

Please note, everybody shouldn't be Digital Creators. I noticed most professional account profiles accept the default provided category [DIGITAL CREATOR], you should ask yourself, where do I have my comparative advantage?

CYBERSECURITY: HOW TO AVOID VISITING A HACKER’S NET (WEBSITE)

Install Focus as your second browser. When you want to visit an untrusted website, copy the URL, launch FOCUS and load it on FOCUS browser, browse it there.

THE DANGER OF GIVING OUT BANK DETAILS ON SOCIAL MEDIA PLATFORMS FOR GIVEAWAY OFFERS

May I reintroduce you to #CBN #eNaira account. eNaira is an official Nigerian Government digital wallet that holds the Nigerian Naira in electronic form.

BREAKING: Twitter Verification to cost $8, Musk confirms in a tweet

It is left to be seen how twitter users will respond to the new development. Elon Musk, just after taking over Twitter, had said, he will bring some innovations into the microblogging platform to drive revenue.

AN OPEN LETTER TO THE AUTHORITY OF FEDERAL UNIVERSITY OF TECHNOLOGY (FUTIA), IKOT ABASI

RE: BSc (Hons) in Cybersecurity I would like the Authorities of Federal University of Technology Ikot Abasi (FUTIA) to apply for approval from National University...

Follow me

Latest articles

Subscribe to our newsletter