fbpx
Home Latest Personal View

Personal View

Articles and opinions authored by Destiny Young

Cybersecurity: Separate your Private Number from your Business Number

0
Given the government's new policy demanding that you synchronize your NIN and BVN to your Bank accounts, There are security implications if your bank-connected line is compromised.

GRC Role: Some Interview Questions You Should Know

0
GRC in cyber security ensures there are clear rules (Governance), proactive identification and mitigation of risks (Risk Management), and adherence to regulations and standards (Compliance)

Embracing Zero Trust in Cybersecurity: A Strategic Approach for Enhanced Cyber...

0
Embracing Zero Trust in cybersecurity is not just a best practice; it is a strategic imperative for organizations seeking to fortify their defences against evolving cyber threats.

Navigating Engineering and Technology Education at the University Level: From Classroom...

0
The journey from classroom to e-learning is not just about technology—it’s about empowering the next generation of engineers and problem solvers.

Laying a Foundation for Success in Engineering and Technology University Education:...

0
Engineering and technology education is not just about acquiring knowledge; it’s about shaping the future

Delivering Technology Education at the University Level: The Imperative of Infrastructure-Driven...

0
The journey from a curious student to a proficient professional begins within the walls of a well-equipped classroom, guided by passionate educators.

Cybersecurity: Expert opinion on awareness education

0
Employees must be given commensurate cyber security awareness to enable their quicker understanding and identification of potential threats.

Why Corporate Organizations must use domain-hosted email

0
Domain-hosted email is necessary from a security perspective because it provides better protection against email-based threats, allows for encryption of emails, and enables the implementation of security policies such as two-factor authentication.

Be Patience: Befriend Google!

0
Fundamentally, the problem with most people is impatience. We lack the patience to carefully source information online; we want a quick fix. You cannot scale...

2024! Prepare for the expected contingency in the labour market

0
We never anticipated that technological advances and the rapid adoption of digital technology would cause a significant shift in business operations and workplace culture. This development has caused employers to rethink recruitment.

Recent Posts

How to Pass CompTIA Security+ SY0-701 Exam with Just 3 Days of Study

0
Passing the CompTIA Security+ SY0-701 exam with just three days of study might seem daunting, but with the right tools and strategies, it’s achievable. Utilizing ChatGPT to generate a customized study guide.

How AI Drives Robotics Process Automation: Revolutionizing Efficiency and Productivity

0
AI is taking RPA to the next level by enabling robots to perform tasks that were previously thought to be the exclusive domain of humans.

What is Pharming in Cybersecurity?

0
Pharming is a type of cybercrime in which attackers redirect users from a legitimate website

Cybersecurity Levy: The Imperative of establishing the Office of the National Cybersecurity Director (ONCD)

0
The Office of the National Security Adviser, traditionally focused on military and physical security matters, might lack the specific expertise required to manage a dedicated cybersecurity fund effectively

What is XDR?

0
XDR uses automation and analytics to detect, analyze, hunt, and remediate threats. It provides visibility into data across networks, clouds, endpoints, and applications.