BlogHide Reblurtslebey1 in blurttribe • 29 days agoCybersecurity: Why it is important to have an Asset Register in a FirmAsset management is an important portion of ensuring information security. How do you keep assets that you don't own safe? Hence the need for a proper and good asset management strategy. The…lebey1 in blurttribe • last monthCybersecurity: Clear Desk and Clear Screen PolicyThe clear desk and Clear screen policy are often handled nonchalantly by firms because they fail to understand their importance. The importance of this policy is to ensure the confidentiality…lebey1 in blurttribe • last monthCybersecurity: Importance of Conducting a VAPT in your OrganisationWith the continuous rise of cybercrimes worldwide, it has become mandatory for firms to employ tools to help harden and tighten their security. A firm security can still be hardened if all staff are…lebey1 in blurttribe • last monthA younger verison of an old modelDreams are part of what makes us humans. Some of the best innovations in the world started with a dream, and then the ideas started rushing out. It is okay to dream, and becoming younger with the…lebey1 in blurttribe • last monthCybersecurity: Getting Documentations right is the first step to ensuring Information securityDocumentation is easy to get right, but it will be funny to know that most organisations struggle to get this right. When we talk about documentation in an organisation, it refers to the soft copies…lebey1 in blurttribe • last monthCybersecurity: How to keep your Mobile phones securedOver 80% of the world's population makes use of mobile phones in today's world. The availability and the outreach have been made possible due to the low cost of acquiring one; with numerous…lebey1 in blurttribe • last monthCryptocurrency: The shitcoin season is upon usEvery season has its perks, and 2023 has been full of that. Many activities seem to be increasing on the blockchain, exponentially resulting in the influx of new projects scattered across the…lebey1 in blurttribe • last monthCybersecurity: What differentiates Routers from SwitchesTechnology has come a long way from the way it used to be. This has also impacted the growth of computers, as computers have gone from occupying blocks of rooms to being portable in this age.…lebey1 in blurttribe • last monthCybersecurity: Firewalls Versus Security guardSecurity guards stationed at office premises are to provide physical security and protect the information, assets and people who access the Organisation building. The security guard, when used…lebey1 in blurttribe • last monthWhat really mattersThe world as we know it keeps changing from the one we are used to living in 10 years ago, and in truth, the world will be different in 20 years’ time. With the improvement in technology, which has…lebey1 in blurttribe • last monthFour things i have learnt from involving myself in Cryptocurrencysource A lot of terms has coined about what cryptocurrency is supposed to be. Everyone has his or her own opinion, and even the critics and government have something to say. The technology might…lebey1 in blurttribe • last monthCybersecurity: Getting Documentations right is the first step to ensuring Information securityDocumentation is easy to get right, but it will be funny to know that most organisations struggle to get this right. When we talk about documentation in an organisation, it refers to the soft copies…lebey1 in blurttribe • last monthPersonal Development: Pratice what you learnWith the amount of knowledge and resources available in the world today, it is very easy to be easily overwhelmed with the information available at their disposal. The world we know today has…lebey1 in blurttribe • last monthCybersecurity: How Firms Mobile devices and BYOD devices should be handled to ensure Information securityEvery component and part that carries, stores and processes information is important in cybersecurity, regardless of how small they might look. It is so easy to discard some company assets such as…lebey1 in blurttribe • 2 months agoCybersecurity: How best to prevent the impact of Insider threat in an organisationHumans are the biggest risk to ensuring the confidentiality, integrity and availability of information assets. While untrained staff and unmotivated staff might reduce the performance of the…lebey1 in blurttribe • 2 months agoMy thoughts on the Hakimi storyYesterday happened to be a very busy day on the internet as the story of what Paris saint germain (PSG) defender called Hakimi did. It is no longer news, but I decided to drop my two cents on the…lebey1 in blurttribe • 2 months agoKey esstential tools to ensure security on the networkCybersecurity is going nowhere soon, and it's important that we prepare for more advanced attacks as technology develops further. The development experience in the technological world seems to have…lebey1 in blurttribe • 2 months agoPassword ManagementThe most common way hackers breach a system is through the password. Password is usually the first line of defence that shows a system that you are who you say you are, i.e. the password…lebey1 in blurttribe • 2 months agoCybersecurity: why an Access Control Audit should be conducted for personal devicessource Cybersecurity involves all assets linked to the internet, so auditing your device on your own will help prevent breaches. Conducting an access control audit on your information assets…lebey1 in blurttribe • 2 months agoCybersecurity: Physical measures that bolster organization securityEvery security control has a unique job and purpose. Therefore, doing it correctly will save the organization money and help it establish a solid reputation. To guarantee that security breaches are…