phone  +234 806 719 1062



The Need for Privileged Access Management

The unprecedented demands of the “new normal” have driven – and still drive – the need for enterprises to be more agile and efficient in their operations. Consequently, organizations are increasingly adopting new technologies in order to fulfill business goals. However, the proliferation of these technologies correspondingly increases the enterprise’s vulnerability to attack. The number...
Read More

Zero Trust Model Explained

Traditionally, organizations adopt the perimeter-based security model which takes a “Trust but Verify” approach. The model is based on the principle that threats come from outside the established security perimeter, while everyone and everything within this perimeter is reliable and can be trusted. Consequently, the model focuses is on implementing state-of-the-art perimeters to protect valuable...
Read More

Lessons from the SANS Institute Data Breach

On August 11, 2020 cybersecurity training provider SANS Institute announced that it had suffered a data breach. The breach was a result of a consent phishing campaign launched against the institute’s employees in late July. Consent phishing refers to the attempt by cybercriminals to trick their targets into installing a malicious application and/or grant it...
Read More

Detecting Ransomware Attacks

Ransomware poses one of the biggest security concerns for organizations today. It is malicious software that encrypts files located on an infected system or network rendering them inaccessible. The legitimate users of these systems are eventually locked out and a fee is typically requested by the attackers before they can regain access to the encrypted...
Read More

Reporting Data Breaches – A Must-have For Nigeria’s cybersecurity Strategy

In Nigeria, details of cyberattacks and data breaches are rarely divulged, creating the impression of safety. But the reality is that Nigeria suffers some of the worst security incidents perpetrated in Africa. A recent report by Sophos revealed that 86% of the Nigerian firms surveyed confessed to being victims of at least one cyberattack during...
Read More

Cryptojacking: Are You Inadvertently Making Cyber-criminals Rich

The rise of cryptocurrencies like Bitcoin, Monero, and Ethereum has brought it with many benefits including greater confidentiality of transactions, faster transaction times, and the elimination of transaction fees. However, it has also introduced new threats and risks including the menace that is cryptojacking. To understand cryptojacking better, we must first consider the key concepts...
Read More

Best Practices for Active Directory Security

Microsoft’s Active Directory (AD) is a directory service that allows for the management of users and other objects within an enterprise network to be centralized. It is primarily used to authenticate and authorize objects in a windows domain. With 90% of organizations worldwide utilizing AD, it has become a prime target for cybercriminals as its...
Read More

Nigeria’s Security Tracker – August 2020

In the month of August 2020, the Nigeria security posture is still tense. This report shows violent incidents related to political, economic, and social grievances directed at the state or other affiliative groups (or conversely the state employing violence to respond to those incidents). August 1: Eighteen civilians were killed by Boko Haram in Mayo-Moskota,...
Read More

Nigeria Security Tracker: July 2020

Source: July 1: Thirty people were kidnapped and two vigilantes killed by bandits in Nasarawa, Nasarawa. July 2: Forty members of the terrorist group Boko Haram were killed by the Nigerian Air Force in Gwoza, Borno. An attack in Mobbar, Borno resulted in the deaths of two civilians, three Nigerian soldiers, and seven Boko...
Read More

2020 Business Email Comprise Trends

Business Email Compromise, or BEC, is a type of impersonation fraud in which cybercriminals obtain access to a corporate email account and then attempt to defraud the company or its employees by impersonating authority figures like executives. The attackers manipulate targets to trick employees of the firm into transferring money into their bank accounts or...
Read More
1 2 3 4

We are open for orders. Purchase your professional tool-kits and resources today. Click here Dismiss