fbpx
Home Latest Personal View

Personal View

Articles and opinions authored by Destiny Young

Cybersecurity: Separate your Private Number from your Business Number

0
Given the government's new policy demanding that you synchronize your NIN and BVN to your Bank accounts, There are security implications if your bank-connected line is compromised.

GRC Role: Some Interview Questions You Should Know

0
GRC in cyber security ensures there are clear rules (Governance), proactive identification and mitigation of risks (Risk Management), and adherence to regulations and standards (Compliance)

Embracing Zero Trust in Cybersecurity: A Strategic Approach for Enhanced Cyber...

0
Embracing Zero Trust in cybersecurity is not just a best practice; it is a strategic imperative for organizations seeking to fortify their defences against evolving cyber threats.

Navigating Engineering and Technology Education at the University Level: From Classroom...

0
The journey from classroom to e-learning is not just about technology—it’s about empowering the next generation of engineers and problem solvers.

Laying a Foundation for Success in Engineering and Technology University Education:...

0
Engineering and technology education is not just about acquiring knowledge; it’s about shaping the future

Delivering Technology Education at the University Level: The Imperative of Infrastructure-Driven...

0
The journey from a curious student to a proficient professional begins within the walls of a well-equipped classroom, guided by passionate educators.

Cybersecurity: Expert opinion on awareness education

0
Employees must be given commensurate cyber security awareness to enable their quicker understanding and identification of potential threats.

Why Corporate Organizations must use domain-hosted email

0
Domain-hosted email is necessary from a security perspective because it provides better protection against email-based threats, allows for encryption of emails, and enables the implementation of security policies such as two-factor authentication.

Be Patience: Befriend Google!

0
Fundamentally, the problem with most people is impatience. We lack the patience to carefully source information online; we want a quick fix. You cannot scale...

2024! Prepare for the expected contingency in the labour market

0
We never anticipated that technological advances and the rapid adoption of digital technology would cause a significant shift in business operations and workplace culture. This development has caused employers to rethink recruitment.

Recent Posts

National Digital Economy and E-Governance Act 2024: THE DIGITAL TRANSFORMATION ERA

0
For effective execution of the provisions under this Act, there shall be established in every public institution an ICT Unit with such number of staff as may be required for efficient performance, effective service delivery, and digital transformation of functions in the respective public institution.

National Digital Economy and E-Governance Act 2024

0
The bill aims to create a legal framework for the digital economy in Nigeria and improve the way the government delivers services to citizens

CrowdStrike: Revolutionizing Cybersecurity

0
CrowdStrike is a leading cybersecurity company dedicated to protecting organizations from cyber threats

Data Lifecycle Management: EXPLAINED

0
Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.

I am working with FG to develop new identity technology in Nigeria – Bill...

0
According to Gates, the ID technology called MOSIP would ensure that every Nigerian gets digital benefits.