What if you misplace your phone, is your confidential data on...
Anti-theft allows you to remotely wipe all your data in the phone. You can sound alarm, trace the location, and lock the device.
Building a Cyber-resilient Business: People, Process and Technology Framework
The PPT framework provides a comprehensive approach to building an effective cybersecurity strategy by integrating people, processes, and technology.
How to enable Two-step verification on your Whatsapp
Adding an email address on two-step verification will allow WhatsApp to send you a link via email to disable two-step verification in case you ever forget your six-digit PIN, and also to help safeguard your account.
Cybersecurity Awareness Month: If an attacker successfully sends a keylogger to...
If you care about the safety of Internet life, ensure all (I mean, all) web access credentials, including your banking apps, have multi-factor authentication...
Layered security architecture, a mechanism for implementing a secured network
The purpose of a multi-layered security approach is to ensure that each individual component of your cybersecurity plan has a backup to counter any flaws or gaps
What you know about Nigeria Data Protection Act 2023
It is expected that the Act will boost the confidence of all Nigerian citizens and residents to fully support the country’s digital economy ambition.
Cybersecurity tops the list of concern as INEC team met with...
INEC Team led by Prof. Mahmood Yakubu and @IFES1987 tech partners from Google and Microsoft, at a meeting held at the IFES HQ, Arlington, Virginia on Wednesday.
NCC alerts Nigerians on Google Chrome extensions malware stealing users’ data
Computer Security Incident Response Team (NCC-CSIRT) has identified five malicious Google Chrome Extensions that surreptitiously track online browser’s activities and steal their data.
How highly secured Microsoft email environment was breached by a Chinese...
Storm-0558 compromised a Microsoft engineer’s corporate account. That account had access to the debugging environment containing the crash dump with the key, and Storm-0558 was able to retrieve it from there without having to tackle the extensive security of the production environment.
Cybersecurity-as-a-Service (CSaaS): What is it?
Cybersecurity-as-a-Service platforms provide integrated security solutions that make it easy for organizations to deploy comprehensive cybersecurity strategies.