DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7219

Join me at Eko89.7fm Monday Jan 29th @ 1.10pm on 21st Century Entrepreneur

0

Good people, join me on Monday Jan 29th at Eko89.7fm. I would be discussing 21st Century Entrepreneur: Demands and Opportunities. Segilola would be the host.

Let us have a conversation on technology, business and innovation all within the constructs of Naija. It is about positioning for opportunities which are unbounded.

 

7.4 – Cyber Ethics

0

Cyber Ethics is a code of internet conduct about the behavior of a user, and what computer systems are tasked to do, and their impacts on society and people. It involves good judgments, manners and being aware of what you are doing, as it relates to cyberspace, and as you deal with people and enterprises. Some […]

This post is only available to members.

7.3 – Cybersecurity Techniques

0

Here are some Cybersecurity Techniques: Access Control and Identity Management Authentication Malware scanners Firewalls Antivirus Access Control And Identity Management The conceptual username and password have been the ultimate way of protecting confidential data. This may be one of the initial measures regarding cybersecurity. In access control systems, users must present credentials before they are given […]

This post is only available to members.

7.2 – Social Media in Cybersecurity

0

Over the last two decades since social media came into existence, it has seen exponential growth. Ad Week survey states that 88% of businesses and 1/3 of Americans are using one or more social media websites. Social media helps to connect the whole world like never before. Social media sites like Twitter and Facebook have […]

This post is only available to members.

7.1 – Changing Trends in Cybersecurity

0

Here are some of the trends which are shaping cybersecurity: Web Servers and Web Applications Cloud Computing and its Services Targeted attacks and APTs Mobile Networks IPv6 : New internet protocol More Encryption Web Servers And Web Applications Hackers attack web apps to distribute malicious code or to extract data. Cyber attackers deliver their malicious […]

This post is only available to members.