Open in app

Sign In

Write

Sign In

The Me
The Me

24 Followers

Home

About

Pinned

Cybersecurity Policies

A cybersecurity policy is a document that stipulates an organization’s cybersecurity vision. It demonstrates an organization’s commitment to security. The cybersecurity policy ensures consistency in acquisition of software and hardware in the organization. It also defines legal consequences of policy violation. Types of Cybersecurity Policies Master Cybersecurity policy. This is…

Cybersecurity

2 min read

Cybersecurity Policies
Cybersecurity Policies
Cybersecurity

2 min read


Pinned

Security Operations Center Charter

Security Operations Center (SOC) ensures organizational cyber well-being by monitoring the infrastructure and managing its cyber hygiene. The SOC uses sensors to look at the status of software and hardware devices, to check for weaknesses and areas of risk, which are reported to management who direct remedial actions as a…

Cybersecurity

5 min read

Cybersecurity

5 min read


Pinned

Facebook Rebrand to Meta

Facebook Rebrand to Meta On October 2021, Facebook, the company that owns social platforms including Facebook, Instagram and WhatsApp, rebranded to Meta. The company’s brand was also the brand of one its social media apps that is Facebook. Meta will enhance relationship of the people with the company rather than…

Facebook

2 min read

Facebook

2 min read


Aug 4, 2022

What next after a password leak

Change your password immediately. Access your device e.g. phone, tablet, desktop/laptop and change your password to a stronger one. In future I will write on creating a strong password that is hard to be cracked or guessed. https://bit.ly/38qK8n2 Log out of all devices that your account is logged in. After…

Passwords

2 min read

Passwords

2 min read


Jul 19, 2022

Cybersecurity Maturity Journey

With the shift of business data from paper-based, highly secure information that is stored in locked physical cabinets, to digital, easy-to-access, anywhere and anytime upon request on digital devices, there has been a notable increase in the associated ICT and cybersecurity risks. …

Cybersecurity

2 min read

Cybersecurity

2 min read


Jul 18, 2022

CALLBACK PHISHING EMAILS

Hackers impersonate CrowdStrike Cybersecurity Company CrowdStrike company is a cybersecurity company based in Austin, Texas. It provides cyber related services such as threat intelligence and cyberattack responses. Hackers are using phishing emails purporting to be CrowdStrike company. The phishing email instructs recipients to call the ‘service provider’ for an audit…

Cyber

1 min read

CALLBACK PHISHING EMAILS
CALLBACK PHISHING EMAILS
Cyber

1 min read


May 6, 2022

European Union Data Protection Code of Conduct for Cloud Service Providers

European Union (EU) Data protection code only applies to “business-to-business” (B2B) cloud services where the Cloud Service Provider (CSP) is acting as a processor. It therefore does not apply to “business-to-consumer” (B2C) services or for any processing activities for which the CSP may act as a data controller. The Code…

Data

2 min read

Data

2 min read

The Me

The Me

24 Followers

Freelancer | Writer | Trainer | Cybersecurity Specialist

Following
  • jenny andersson

    jenny andersson

  • Cory Doctorow

    Cory Doctorow

  • Markham Heid

    Markham Heid

  • Abdelmoghit Guenfdi

    Abdelmoghit Guenfdi

  • Lia Chen

    Lia Chen

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech