phone  +234 806 719 1062



The Rights of Data Subjects: Nigerian Data Protection Regulation 2019

The National Information Technology Development Agency (NITDA) is statutorily mandated by the NITDA Act of 2007 issued the Nigeria Data Protection Regulation to safeguard, regulate and protect the critical information infrastructure and data of individual and corporate bodies from breaches. This is an except from the regulation detailing the rights of a data subject.  ...
Read More

Half a Million Zoom Accounts for Sale on the Dark Web

Even accounts belonging to banks and educational institutions were found on lists plastered across various hacker forums Amer Owaida 16 Apr 2020 – 09:34AM More than 500,000 Zoom accounts are now up for grabs on hacker forums hosted on the dark web. Some are going for less than a US cent apiece while others are...
Read More

Setting Up The Ultimate Work From Home Environment

Document Management. Redefined. M-Files and Mitiget bring to you the only intelligent information management platform that organizes content based on what it is, not where it’s stored. You can even connect to existing network folders and systems to make them more intelligent with built-in AI to automatically categorize and protect information. In this piece, you...
Read More

Remote Working: Cybersecurity Tips for Working From Home

The COVID-19 pandemic has resulted in many people working from home for the first time. Working from home has specific cybersecurity risks, including targeted cyber-crime. When compromised, unauthorized access to your stored information can have a devastating effect on your emotional, financial, working life and the organization you work in. To ensure your business, personal...
Read More


Internet-facing systems and applications pose security risks. These security risks are the results of vulnerabilities present within the systems and applications which can be exploited for malicious purposes. A vulnerability is any mistake or weakness within the security procedures, design, implementation, or any control that will lead to the violation of the system’s security policy....
Read More


This report provides an overview of the most common threats and vulnerabilities in Q1 2020. There has been a significant rise in phishing emails, ransomware attacks, zero-day exploits of technology vulnerabilities and activities of targeted threat groups. These are some of the top common threats: Phishing Emails With the global spread of COVID-19, there has...
Read More

Why We Won’t be Going Back to “Business as Usual” after COVID-19

As we all try to assess the impact of coronavirus, inevitably some of those thoughts center around how this is impacting our work life, and some of the longer-term impacts for businesses. While the world is dealing with the worst health crisis of the last 100 years, I’m trying to avoid the constant deluge of...
Read More

Cyber-criminals Use COVID-19 Crisis to Spread Phishing Emails

Cybersecurity Trends By Mitiget Coronavirus, also known as Covid-19, continues to generate headlines around the world due to its public health crisis.  Dr Tedros Adhanom Ghebreyesus, the Director General of the World Health Organization (WHO) confirmed on 28th February, 2020, that as of 6am Geneva time, China had reported a total of 78,959 cases of...
Read More

Nigerian Data Protection Regulation 2019 – A Privacy Compliance Guide Part 1

The National Information Technology Development Agency (NITDA) is statutorily mandated by the NITDA Act of 2007 to develop regulations for electronic governance and monitor the use of electronic data interchange and other forms of electronic communication transactions as an alternative to paper-based methods in government, commerce, education, the private and public sectors, labour and other...
Read More

Emerging Risks in 2020 and Beyond – New Game, New Rules

The risk landscape is changing fast. Every day’s headlines bring new reminders that the future is on its way, and sometimes it feels like new risks and response strategies are around every corner. The outlines of new opportunities and new challenges for risk leaders—indeed, all organizational leaders—are already visible. So what should leaders prepare for...
Read More
1 2

We are open for orders. Purchase your professional tool-kits and resources today. Click here Dismiss