Cybersecurity Awareness Month: Tips to stay safe on the internet
Enable two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of authentication, such as a fingerprint or a code sent to your phone.
Destiny Young | Top ’25 Cybersecurity Star of the Year’
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D
CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE...
The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.
Embedded Systems: The Need for a Specialized Cybersecurity Strategy
Embedded systems are often used with functionally-limited storage devices such as banking, savings or discount cards.
NCC-CSIRT Warns of Pirated YouTube Software-related Malware
Furthermore, the advisory recommends installation of antivirus software with internet security and keeping it up to date,...
Layered security architecture, a mechanism for implementing a secured network
The purpose of a multi-layered security approach is to ensure that each individual component of your cybersecurity plan has a backup to counter any flaws or gaps
CYBERSECURITY: HOW TO AVOID VISITING A HACKER’S NET (WEBSITE)
Install Focus as your second browser. When you want to visit an untrusted website, copy the URL, launch FOCUS and load it on FOCUS browser, browse it there.
Implementing ISO 27001 Information Security Management: The Processes
ISO/IEC 27001 helps you implement a robust approach to managing information security (infosec) and building cyber resilience within organisation.
CYBERSECURITY ALERT: DON’T RUSH TO OPEN THAT IMAGE, VIDEO OR MUSIC...
Please note, hackers use the technique called Steganography to deliver virus into your device and attack you.
Nigeria: Personal Data Privacy; Matter Arising
Data Privacy focuses on the rights of individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern personal data of individuals