CCybersecurity Read More 3 minute read Why You Should Avoid Public Wi-Fi (Wireless Fidelity)byPraise OkaegbuJanuary 31, 2023 Public Wireless Fidelity (Wi-Fi) users are at risk from hackers, but fortunately, there are safeguards against them. The… Read More
CCybersecurity Read More 3 minute read Kerboroasting AttackbyBenjamin AkanoJanuary 27, 2023 The scary face of Kerberoasting attack The ugly truth is that cybercrime is on the rise. It has… Read More
GGeneral ICT Read More 2 minute read Why do your Email go to spam?byPraise OkaegbuJanuary 24, 2023 Have you ever thought about how many people take the time to filter through their spam folder to… Read More
CCloud Computing Read More 2 minute read Reimagine the way you workbyBenjamin AkanoSeptember 27, 2022 Efficiency is an important ingredient in running a business. Being able to create, collaborate and communicate seamlessly makes… Read More
CCybersecurity Read More 2 minute read Recover your missing or lost devicebyBenjamin AkanoSeptember 23, 2022 Have your gadget ever been stolen, missing, or misplaced and you wish it could be recovered? As the… Read More
CCybersecurity Read More 2 minute read Protecting your Organization from Cyber ThreatsbyBenjamin AkanoSeptember 23, 2022 Effective cybersecurity is crucial to businesses — and it’s becoming even more important as businesses are transforming digitally… Read More
CCloud Computing Read More 5 minute read From enabling hybrid work to creating collaborative experiences—here’s what’s new in Microsoft 365byInioluwa AkindehinAugust 2, 2022 Now that hybrid work is just work, the challenge for organizations is to balance employee demands for flexibility… Read More
CCloud Computing Read More 4 minute read How Microsoft Teams uses AI and machine learning to improve calls and meetingsbyInioluwa AkindehinAugust 2, 2022 As schools and workplaces begin resuming in-person operations, we project a permanent increase in the volume of online… Read More
CCybersecurity Read More 3 minute read Luna and Black Basta — new ransomware for Windows, Linux and ESXibyOlarewaju AkejuJuly 21, 2022 In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back… Read More
CCybersecurity Read More 3 minute read Text-based fraud: from 419 scams to vishingbyOlarewaju AkejuJuly 18, 2022 E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But… Read More