credit/debit card cloning has increased the number of financial fraud in Nigeria. This is done by skimming and aided by rouge people in the financial business among others
BlogA collection of 86 posts
Cyber kill chain is used to describe various stages of cyber attacks.It goes through stage from gathering information to successfully infiltrating and compromising the organization
Use cases gives you value for your SIEM. With the right component of use cases such as event, sources, and response, the SIEM will be a powerful tool
A brief summary of the first IAPP (Nigeria Chapter) KnowledgeNet Event. The first IAPP (International Association of Privacy Professionals) Nigeria…
The cloud environment comes with it’s own security threats.it is important for organizations to ensure that security best practices are adhered to.
The Supply chain is a big risk to our businesses and if not managed properly, it will pose a lot of security risk to organizations and thereby opening organization to various cyber threats.
Online scam which is also known as internet fraud.This includes dating/romance scam,inheritance Scam.If it really seems just too good to be true, it may well be!
Mobile devices are susceptible to hacking and malware just like our laptops,.In 2018, there were a total of 60.176 mobile based malware
A secure email gateway is essential to protecting your business from malicious content contained within emails by preventing them from reaching their intended recipient.