Strengthening Cyber Defences for Organizations
Introduction According to the 2021 UK Cybersecurity Breach Survey, four out of every ten organizations reported a cyber-attack in the last year, and as enterprises transition to a new era…
Introduction According to the 2021 UK Cybersecurity Breach Survey, four out of every ten organizations reported a cyber-attack in the last year, and as enterprises transition to a new era…
National Cyber Security Awareness Month 2021 Our society, personal lives, business transactions, and critical infrastructures have become largely dependent on computer networks and information communication technology. Almost everything from our…
At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, Death Certificate and Will Certificate).…
Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, and so the need to obtain authentic information cannot be over-emphasized. Since not all information out there is factual and correct, consumers of digital services must know who to follow in the cyberspace and where to search for the right information about coronavirus on digital platforms.
Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked for personal details which can be used for fraudulent purposes.
Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift cards that appear to be sent from your phone contacts. Following the link will take you through to another site that looks genuine and would be requesting your personal details.
If you connect, you must protect. Whether it is your computer, smartphone, or other network devices, the best defense against threats and attacks is to update to the latest security software, web browser, and operating systems.
Sharing Online Content It is great to share a link to a website and grab your friend’s & contact’s attention. But you never know that hackers are always with bated…
In this third part of the series on Social Media security and privacy, I would like to further expose the reader to other unsuspecting pieces of information that attackers earnestly…
Social networking sites are online platforms that allow people to connect with each other and build interpersonal relations. It has become a vital part of our modern life and its…