fbpx

Implementing ISO 27001 Information Security Management: The Processes

7
ISO/IEC 27001 helps you implement a robust approach to managing information security (infosec) and building cyber resilience within organisation.

Data Privacy: the need for compliance with NDPR

1
Cyber security threat landscape has grown exponential in recent years, with hackers using sophisticated technology to compromise networks and users.

NIN verification using your NIN slip will no longer acceptable, use...

0
International Standard Organisation (ISO) 270001 Information Security Management System (ISMS) requires that organisations assess information security risks, put in place robust security controls and...

CYBERSECURITY ALERT: DON’T RUSH TO OPEN THAT IMAGE, VIDEO OR MUSIC...

0
Please note, hackers use the technique called Steganography to deliver virus into your device and attack you.

Facebook Creator and Monetisation: I hope this explanation helps

1
Please note, everybody shouldn't be Digital Creators. I noticed most professional account profiles accept the default provided category [DIGITAL CREATOR], you should ask yourself, where do I have my comparative advantage?

CYBERSECURITY: HOW TO AVOID VISITING A HACKER’S NET (WEBSITE)

521
Install Focus as your second browser. When you want to visit an untrusted website, copy the URL, launch FOCUS and load it on FOCUS browser, browse it there.

THE DANGER OF GIVING OUT BANK DETAILS ON SOCIAL MEDIA PLATFORMS...

0
May I reintroduce you to #CBN #eNaira account. eNaira is an official Nigerian Government digital wallet that holds the Nigerian Naira in electronic form.

BREAKING: Twitter Verification to cost $8, Musk confirms in a tweet

0
It is left to be seen how twitter users will respond to the new development. Elon Musk, just after taking over Twitter, had said, he will bring some innovations into the microblogging platform to drive revenue.

AN OPEN LETTER TO THE AUTHORITY OF FEDERAL UNIVERSITY OF TECHNOLOGY...

1
RE: BSc (Hons) in Cybersecurity I would like the Authorities of Federal University of Technology Ikot Abasi (FUTIA) to apply for approval from National University...

TINUBU’s Education Policy, a Novel Introduction in Nigeria’s History

0
TINUBU’s Education Policy, a Novel Introduction in Nigeria’s History Destiny Young, Uyo One of TINUBU’s most inviting policy in his Manifesto is the provision for Nigerian...

Recent Posts

The Importance of Cyber Hygiene in a Modern Workplace

0
As technology continues to transform the business landscape, maintaining strong cyber hygiene practices is no longer optional – it's a critical component of organizational success and resilience

Cybersecurity in Government Organizations, The Case of OAGF Hack: A Call to Action

2
By Destiny Young, a Chartered Information Technology Practitioner and Cybersecurity Engineer Introduction The recent hack of the Office of the Accountant General of the Federation (OAGF)...

Zero Trust Architecture in a Remote World: Securing the New Normal

0
With remote work becoming increasingly common, organizations require a security model that can adjust to the unique challenges presented in this new setting

Apple vs Android:  Comparing and Contrasting Features

0
Some features may be available on certain device models or through third-party apps, even if they're not native to the operating system.

Navigating the Digital Age: Why Cybersecurity is Everyone’s Responsibility

2
Information security is everyone's business, it's your primary responsibility to protect your data from being compromised and stolen