More
Сhoose

Latest Posts

Day 14: Smishing—Beware of unsolicited messages that are baits to defraud you.
Cybersecurity in 31 Days with Malan Moses Faya October 14, 2018

Day 14: Smishing—Beware of unsolicited messages that are baits to defraud you.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 14. To view previous posts, click here. Beware of any unsolicited text messages, especially from unknown or suspicious contacts. They may be ‘smishing’ messages. Smishing is a.. Read more

Day 13: Use only trusted app stores such as the Apple App Store and Google Play.
Cybersecurity in 31 Days with Malan Moses Faya October 13, 2018

Day 13: Use only trusted app stores such as the Apple App Store and Google Play.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 13. To view previous posts, click here. Malicious programs or malware often infect a mobile device when you download applications from an untrusted source. This is one.. Read more

Day 12: Protect your kids from dangerous and unhealthy online contents.
Cybersecurity in 31 Days with Malan Moses Faya October 12, 2018

Day 12: Protect your kids from dangerous and unhealthy online contents.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 121. To view previous posts, click here. Keeping your operating system and software up to date is as critical as changing your car oil. Every now and.. Read more

Day 11: Always update your browser, operating system, software, and plugins.
Cybersecurity in 31 Days with Malan Moses Faya October 11, 2018

Day 11: Always update your browser, operating system, software, and plugins.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 11. To view previous posts, click here. Keeping your operating system and software up to date is as critical as changing your car oil. Every now and.. Read more

Day 10: Delete all sensitive data stored in electronic and removable media devices before disposing of them.
Cybersecurity in 31 Days with Malan Moses Faya October 10, 2018

Day 10: Delete all sensitive data stored in electronic and removable media devices before disposing of them.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 10. To view previous posts, click here. Our electronic devices or media devices all store information we may not want anyone else to access. This is why.. Read more

Former Mo’Hits Stars or Former Cultists?: Unauthorized Publication of Pictures, Image Rights, and Nigerian Law
Intellectual Property October 8, 2018

Former Mo’Hits Stars or Former Cultists?: Unauthorized Publication of Pictures, Image Rights, and Nigerian Law

by Blossom Egbude Over the past week, a picture originating from a Twitter user circulated social media. This picture shows former Mo’Hits Records stars and Nigerian celebrities, Don Jazzy, Dr Sid, D’Prince, Wande Coal, and D’Banj tagged as cultists by.. Read more

Day 7: Protect your data and privacy when on Wi-Fi by only using secured connections.
Cybersecurity in 31 Days with Malan Moses Faya October 7, 2018

Day 7: Protect your data and privacy when on Wi-Fi by only using secured connections.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 7. To view previous posts, click here. In electronic communication, wireless technology has spread widely. Whether at home, work, or school or in hotels, libraries, or shared.. Read more

Day 6: Whenever you use an ATM, cover the keypad and screen.
Cybersecurity in 31 Days with Malan Moses Faya October 6, 2018

Day 6: Whenever you use an ATM, cover the keypad and screen.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 6. To view previous posts, click here. The rate of ATM-card related scams have been high. Very high. With ATM fraudsters everywhere these days, you can’t be.. Read more

1 8 9 10 11 12 17