Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 10. To view previous posts, click here. Our electronic devices or media devices all store information we may not want anyone else to access. This is why.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 10. To view previous posts, click here. Our electronic devices or media devices all store information we may not want anyone else to access. This is why.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 9. To view previous posts, click here. Hotspots can be hotbeds for stealing personal and sensitive data. How? Hackers have been found to create free hotspots as.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 8. To view previous posts, click here. Anytime your computer is logged in, it is vulnerable to physical intrusion. Anybody can get onto your computer and review.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 7. To view previous posts, click here. In electronic communication, wireless technology has spread widely. Whether at home, work, or school or in hotels, libraries, or shared.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 6. To view previous posts, click here. The rate of ATM-card related scams have been high. Very high. With ATM fraudsters everywhere these days, you can’t be.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 5. To view previous posts, click here. I read somewhere that in the good old days, people get mad when you access their diaries without their consent… Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 4. To view previous posts, click here. Remember the days of Infrared? Though old school now, a hacker would at least need to connect with your mobile.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 3. To view previous posts, click here. As life and business become increasingly mobile, mobile-phone communication has become prevalent. Accessing workplace data on a mobile phone benefits.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host for the next 31 days. Whenever you share your password, you become vulnerable to cyber attacks. This may cause you to lose personal and sensitive information that may hurt you.. Read more