More
Сhoose

Tag: Cybersecurity

A Precaution to Businesses that Control Personal Data: NITDA’s N5million fine against Electronic Settlement Limited as a Case in Point
Data Protection and Privacy May 6, 2021

A Precaution to Businesses that Control Personal Data: NITDA’s N5million fine against Electronic Settlement Limited as a Case in Point

by Gabriel Eze, Associate The National Information Technology Development Agency (NITDA) is a data protection authority in Nigeria. It issued the Nigeria Data Protection Regulation 2019 (the ‘NDPR’). The NDPR requires data controllers that process personal data that meet certain.. Read more

Cyber Security for Lawyers and Law Firms: Tackling Cyber risks and Data Breaches
Other Posts May 21, 2019

Cyber Security for Lawyers and Law Firms: Tackling Cyber risks and Data Breaches

This is a study on Nigerian law firms’ cybersecurity and data protection hygiene. The data represented in this study is a compilation of data by the author and gathered through an online anonymized survey. The data points were specifically selected.. Read more

Day 30: Always prefer complicated passwords to simple ones.
Cybersecurity in 31 Days with Malan Moses Faya October 30, 2018

Day 30: Always prefer complicated passwords to simple ones.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 30. To view previous posts, click here. Simple passwords are guessed in minutes by a password-cracker program. Always use complicated passwords. A password-cracker program can be used.. Read more

Day 29: Keep (your) kids away from danger online.
Cybersecurity in 31 Days with Malan Moses Faya October 29, 2018

Day 29: Keep (your) kids away from danger online.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 29. To view previous posts, click here. Kids may be exposed to danger online. Teach (your) kids what they can and can’t share over the Internet. Kids.. Read more

Day 28: Properly dispose of all sensitive hardcopy files.
Cybersecurity in 31 Days with Malan Moses Faya October 28, 2018

Day 28: Properly dispose of all sensitive hardcopy files.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 28. To view previous posts, click here. Sensitive hardcopy files, if not properly disposed, can represent a significant security issue. A hardcopy file can be copied without.. Read more

Day 27: Only send sensitive information through sites that use Secure Sockets Layer (SSL) or HTTPS sites.
Cybersecurity in 31 Days with Malan Moses Faya October 27, 2018

Day 27: Only send sensitive information through sites that use Secure Sockets Layer (SSL) or HTTPS sites.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 27. To view previous posts, click here. For a safer web browsing experience, look for HTTPS in the web address before submitting sensitive information to a site… Read more

Day 26: Never open .exe files from your email.
Cybersecurity in 31 Days with Malan Moses Faya October 26, 2018

Day 26: Never open .exe files from your email.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 26. To view previous posts, click here. Certain types of attachment are more dangerous than others. While viruses and malware can potentially be embedded in most types.. Read more

Day 25: Do not fall for scams by impersonators on social media.
Cybersecurity in 31 Days with Malan Moses Faya October 25, 2018

Day 25: Do not fall for scams by impersonators on social media.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 25. To view previous posts, click here. Social media is now the haunting ground used by scammers in finding their victims. The most common social-media scams reported.. Read more

Day 24: Beware of SEO poisoning whenever you use a search engine.
Cybersecurity in 31 Days with Malan Moses Faya October 25, 2018

Day 24: Beware of SEO poisoning whenever you use a search engine.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 24. To view previous posts, click here. Cybercriminals use search engine optimization (SEO) to trick you into visiting malware sites. SEO poisoning is an attack method that.. Read more

Day 23: Rooting your phone or device can be dangerous.
Cybersecurity in 31 Days with Malan Moses Faya October 23, 2018

Day 23: Rooting your phone or device can be dangerous.

Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 23. To view previous posts, click here. Rooting is a process that allows a user to have superuser rights. With superuser right, you have privileges to modify.. Read more

1 2 3 4