Nigeria Cyber Security Outlook 2019

2018 was a year of tremendous technological innovation and landmark shift in thinking. On the other hand, it was plagued with several high profile privacy and cybersecurity breaches within and outside Nigeria. One of the most prominent security breaches was the Facebook data scandal.  Cambridge Analytica acquired personally identifiable information of up to 87 million…

2018 was a year of tremendous technological innovation and landmark shift in thinking. On the other hand, it was plagued with several high profile privacy and cybersecurity breaches within and outside Nigeria. One of the most prominent security breaches was the Facebook data scandal.  Cambridge Analytica acquired personally identifiable information of up to 87 million…

How to identify fraudulent bank emails

Nike Popoola Internet fraudsters are desperately devising different techniques to confuse customers of banks who make use of electronic system in order to have access to their funds and swindle them. One major way is to intercept their online transactions to get information about the account holders. Often times, they send junk mails to a…

Nike Popoola Internet fraudsters are desperately devising different techniques to confuse customers of banks who make use of electronic system in order to have access to their funds and swindle them. One major way is to intercept their online transactions to get information about the account holders. Often times, they send junk mails to a…

Six ways to use your debit cards safely

Nike Popoola Aderemi Jacobs never forgets to take his bank debit cards with him because of its convenience whenever he needs to withdraw from the Automated Teller Machine. He will, however, not use the debit cards to pay for items on the Point of Sale terminals; he prefers to go to the ATM to first…

Nike Popoola Aderemi Jacobs never forgets to take his bank debit cards with him because of its convenience whenever he needs to withdraw from the Automated Teller Machine. He will, however, not use the debit cards to pay for items on the Point of Sale terminals; he prefers to go to the ATM to first…

How to keep your account safe.

1. Do not click on Links in an unexpected email to access a webpage 2. Emails, SMS or Phone calls requesting for Personal Information, Pin, Password, ATM Card Details. 3. Fraudsters are known to send urgent request for bank account details claiming if you do not give this details, your will be suspended. 4. NO…

1. Do not click on Links in an unexpected email to access a webpage 2. Emails, SMS or Phone calls requesting for Personal Information, Pin, Password, ATM Card Details. 3. Fraudsters are known to send urgent request for bank account details claiming if you do not give this details, your will be suspended. 4. NO…

What’s what. Online terminology

Anti-spyware program This is a program that protects your PC against spyware and helps to keep your computer and personal details secure. e.g. Webroot® SecureAnywhere™ Browser Browser software provides you with the means to view a webpage. Without browser software, you would not be able to surf the Internet. Cookies This is a collection of…

Anti-spyware program This is a program that protects your PC against spyware and helps to keep your computer and personal details secure. e.g. Webroot® SecureAnywhere™ Browser Browser software provides you with the means to view a webpage. Without browser software, you would not be able to surf the Internet. Cookies This is a collection of…

Tips to avoid phishing and identity theft

Criminal gangs are constantly inventing new ways to try and get their hands on your money. You can help keep the cash in your bank account safe and reduce your chances of becoming a victim of fraud by following these simple steps: 1) First of all, make sure your computer or laptop is protected with…

Criminal gangs are constantly inventing new ways to try and get their hands on your money. You can help keep the cash in your bank account safe and reduce your chances of becoming a victim of fraud by following these simple steps: 1) First of all, make sure your computer or laptop is protected with…