fbpx

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

What if you misplace your phone, is your confidential data on...

0
Anti-theft allows you to remotely wipe all your data in the phone. You can sound alarm, trace the location, and lock the device.

Building a Cyber-resilient Business: People, Process and Technology Framework

0
The PPT framework provides a comprehensive approach to building an effective cybersecurity strategy by integrating people, processes, and technology.

How to enable Two-step verification on your Whatsapp

0
Adding an email address on two-step verification will allow WhatsApp to send you a link via email to disable two-step verification in case you ever forget your six-digit PIN, and also to help safeguard your account.

Cybersecurity Awareness Month: If an attacker successfully sends a keylogger to...

0
If you care about the safety of Internet life, ensure all (I mean, all) web access credentials, including your banking apps, have multi-factor authentication...

Layered security architecture, a mechanism for implementing a secured network

0
The purpose of a multi-layered security approach is to ensure that each individual component of your cybersecurity plan has a backup to counter any flaws or gaps

What you know about Nigeria Data Protection Act 2023

0
It is expected that the Act will boost the confidence of all Nigerian citizens and residents to fully support the country’s digital economy ambition.

Cybersecurity tops the list of concern as INEC team met with...

0
INEC Team led by Prof. Mahmood Yakubu and @IFES1987 tech partners from Google and Microsoft, at a meeting held at the IFES HQ, Arlington, Virginia on Wednesday.

NCC alerts Nigerians on Google Chrome extensions malware stealing users’ data

0
Computer Security Incident Response Team (NCC-CSIRT) has identified five malicious Google Chrome Extensions that surreptitiously track online browser’s activities and steal their data.

How highly secured Microsoft email environment was breached by a Chinese...

2
Storm-0558 compromised a Microsoft engineer’s corporate account. That account had access to the debugging environment containing the crash dump with the key, and Storm-0558 was able to retrieve it from there without having to tackle the extensive security of the production environment.

Cybersecurity-as-a-Service (CSaaS): What is it?

0
Cybersecurity-as-a-Service platforms provide integrated security solutions that make it easy for organizations to deploy comprehensive cybersecurity strategies.

Recent Posts

The Importance of Cyber Hygiene in a Modern Workplace

0
As technology continues to transform the business landscape, maintaining strong cyber hygiene practices is no longer optional – it's a critical component of organizational success and resilience

Cybersecurity in Government Organizations, The Case of OAGF Hack: A Call to Action

2
By Destiny Young, a Chartered Information Technology Practitioner and Cybersecurity Engineer Introduction The recent hack of the Office of the Accountant General of the Federation (OAGF)...

Zero Trust Architecture in a Remote World: Securing the New Normal

0
With remote work becoming increasingly common, organizations require a security model that can adjust to the unique challenges presented in this new setting

Apple vs Android:  Comparing and Contrasting Features

0
Some features may be available on certain device models or through third-party apps, even if they're not native to the operating system.

Navigating the Digital Age: Why Cybersecurity is Everyone’s Responsibility

0
Information security is everyone's business, it's your primary responsibility to protect your data from being compromised and stolen