Color LogoLoading...

🌍 Feed

✍🏿 Compose

Thinking Of Quitting Cybersecurity? Dr Iretioluwa Shares Her Courageous Journey Through PhD.

Faith Atabo

I write to break down technical jargons into interesting, understandable and simpler forms.  Mar 11, 2024
Thinking Of Quitting Cybersecurity? Dr Iretioluwa Shares Her Courageous Journey Through PhD.



If anyone ever told  you “transitioning into cybersecurity” was easy, they obviously lied to you. But, remember, nothing good comes easy.


It's takes serious dedication, commitment, consistency and hard work. This industry will cost you a lot of things; your time, money, mental health just to mention a few .


From writing countless exams and certifications, to mastering technical skills. All I can say is that Cybersecurity is not for the faint hearted.


My Personal Struggle

I personally have had my own share of “the things transitioning into cybersecurity cost me”. At some point, I had to take a break. I asked myself the Nigerian question “who sent you”, so I moved on to doing other things, until I found the courage to pick it up again.


My biggest set back was failing my ISC2 Certification exam. I felt so bad and it almost affected my mental health. I decided to take a break, but I'm gradully finding my “foot” and preparing to write the exams again.



In this article, I will be sharing with you the very words of  Dr Iretioluwa Akerele, who recently completed her Phd. She's a global voice and a force to be reckoned with.


Her journey will inspire you greatly. and her determination in the face of daunting challenges will stir up courage within you. Let's dive into what she said and I quote.


Doctor Iretioluwa Akerele

Since it’s my PhD Graduation today, I have decided to share some interesting moments from my PhD journey.


I wanted to quit after my first year and settle for a Masters in Research.


I gave birth to my daughter two days after one of my first year lectures. Less than two weeks after giving birth to her, 


I submitted my last coursework for the semester.


I was given an option to defer my PhD because of childbirth. My eyes were on the goal till the last moment. Defer was not a word in my dictionary.


Two weeks after childbirth, I went to the University to present one of my courseworks. I was dizzy before I left home that day.


I struggled to navigate my PhD during Covid. It was tough combining Academic work with a whole pandemic.


My PhD did not stop me from attending parties and going out. It was a way of forgetting my worries and enjoying the moment.


My supervisors believed in me. They were there for me from start to finish. In my first year of research work, they were meeting with me weekly until they were comfortable with my work.


I once cried during one of my review meetings with my supervisors. They made a major change to my work and I didn’t know where to go from there. I burst into tears during the video call. They were supportive ❤️


I used my two hour rule to finish my PhD in record time. I was consistent by dedicating a minimum of two hours to my research work daily.


I cried bitterly two weeks to my final submission. I was on a review call with my supervisor and I was crying while she was correcting my work. I was ready to quit again when I saw the major changes in my work 🤣🤣


My husband listened to my rants for 4 years. He is not a tech bro, but was always ready to listen to every rant. A top guy.


Paper rejections humbled me. On some days, I cried and felt really bad. On some other days, I moved on quickly as if nothing happened.


I struggled with writer's block. On some days, I would just go blank and will have nothing to write, after a thorough research work. I learnt to drink water, relax and drop my work when nothing is flowing.


I made good friends along the way. They supported me till the very end. I had friends who were constantly checking in, reviewing my work and sending words of encouragement.


My daughter ruined one of my video presentations. She cried until I was forced to turn off my camera and end the call.


If you are currently on your PhD journey, my story is an encouragement that you should not give up. It’s tough and challenging, but it’s worth it in the end.”


My Final Thoughts

My jaw dropped after reading Dr Iretioluwa’s statement. I drew so much courage and strength from what she said.


So, if you are just like me who has experience a few setbacks in my cybersecurity journey and you're thinking of “throwing in the towel”. I hope you can draw strength from Dr Iretioluwa's story.


You can connect with Dr Iretioluwa Akerele for mentoring, as well as cybersecurity updates via her x(formaly Twitter ) handle.Click here

Top comments(0)

SEND

You may like this too...

Many newbie’s in the cybersecurity industry make the mistake of just focusing on acquiring certifications and not a proper practical knowledge.

If you are in this shoe, this article is for you.


I will be sharing with you the words of Africa most celebrated female cybersecurity Professional. I am most certain, it will guide into a successful cybersecurity career. Stay tuned!


The Need For More Cybersecurity Experts


The Covid era led to a massive increase in digitalization. Sadly, this also led to a serious spike in cyber attacks running into billions of dollars.

What is the solution to this multi billion dollar problem?. The answer is more cybersecurity professionals.



The cybersecurity industry is one of the fastest growing sectors that provides jobs full of success.It’s employment rates are high, career path are versatile with a competitive salary and overall satisfaction.


Hence, you are making the right choice.


Africa’s Most Celebrated Female CyberSecurity Expert

Confidence Staveley is the executive director of Cybersafe Foundation, Africa’s leading non-governmental organization in the Digital Development domain, on a mission to facilitate pockets of change that ensure inclusive and safe digital access in Africa.

Through its initiatives, they  work to improve inclusive and safe digital uptake in Africa, especially for the most vulnerable in our society


Confidence staveley is a woman of great influence and affluence, especially in the cybersecurity industry, a global voice known all over the world.


What Did CS Say?

Confidence Staveley, commonly called  “ CS”, by those who closely work with her, in her recent advise to those who wanted to consider cybersecurity as career had this to say and I quote;


“My advice is that you start from the end then work your way back to fill the gaps. What do I mean? Research the internet and find an opening for a defense centered entry level job role you would really like to land.


Look closely at the job requirements and responsibilities for the role. Then take just 60-70% of those requirements and begin to study to gain the skills.


Notice I’ve made no mention of certs here because you need to move your attention to learning about cloud platforms, standards and tools.


Using a combination of paid and free resources, you can learn these. Since you haven’t said exactly what area of defense you’re looking at, I can’t recommend specific courses.


Please don’t be obsessed with certifications, concentrate on getting practical skills and knowledge of tools. You will be hired based on perceived potential and applicable demonstration of knowledge.”


Use the link below to get more cybersecurity information from CS herself


click here 


 


Faith Atabo

Mar 4, 2024

Cybersecurity Awareness


Dean: Hi Jophile, where have you been? I did not see you in the Class.


Jophile: oh!, I was having a Class with Mr Larry


Dean: Hmm okay. But you missed a lot. So what was the class all about?


Jophile: Cybersecurity Awareness


Dean: Please, tell me all I need to know about It. Thank You.


Jophile: Ok.


Cybersecurity Awareness is Important as it protects an organization from Cyber attacks on the system, resulting in data infringements.


The primary focus is the prevention of such incidents that lead to loss of brand reputation and financial losses as well.


What is Cybersecurity Awareness?

Cybersecurity Awareness refers to how much end-users know about 


cybersecurity threats, the risks they introduce, and how to mitigate security best practices


Cybersecurity Awareness is the level of understanding of an end user about cybersecurity practices


and cybersecurity threats that their network or organization faces every day.


Importance of Cybersecurity


1. Compliance:

This means adhering to standards or just a report function that shows a business meets a set of requirements.


An organization achieves Compliance by establishing risk-based controls that protect the confidentiality, integrity, and availability, (CIA) of information.



2. Information Sensitivity

Information sensitivity is the control of access to information or knowledge 


that might result in a loss of level of security if disclosed to others


Sensitive Information is Data that must not be disclosed but protected from unauthorized access to safeguard the privacy or security of individuals or organizations.



3. Protecting against Cyber Threats:

Cybersecurity Awareness training is important as staff in a Technology working space are enlightened about cyber threats, how these threats can harm the business,


And how it can be resolved, thereby reducing the risk of Cyberattacks in our Workplaces, financial losses, etc



4. Mitigating Financial Losses:

Cyber Security Awareness training helps employees know what needs to be in place in an organization,


especially the threats they can face which could lead to financial losses.


When Employees are not enlightened on Cybersecurity Threats and solutions, they won’t be able to site, prevent, and report them.


Before they get to know it, financial data would be taken out through Data Breaches, etc.


Cyber safety awareness helps to Mitigate Financial Losses.


In Conclusion,

With Cybersecurity threats, increasing significantly, cybersecurity awareness is vital to keeping your workforce and Business Safe Online.


Follow Me for More 

Wazoplus: https://www.wazoplus.com/u/Heavens123

Joy Michael

Mar 2, 2024

Cybersecurity threats pose a special risk to organizations because they have the potential to cause large financial losses, harm to a company’s brand, and interruptions of operation.


QUESTION!!

What is a Cybersecurity Threat?


A Cybersecurity Threat refers to any situation or occurrence that can have negative consequences


for a business’s operation, functions, brand, reputation, or perceived image.


Here are the Top 5 Cybersecurity 

Threats and Solutions Designed to protect digital systems and data from attacks.⬇️⬇️⬇️

  1. Data Breaches:

A data breach comes as a result of a cyber attack that allows cybercriminals to gain unauthorized entry to a computer system or network


and steal the private, sensitive, or confidential personal and financial data of the customers.


These breaches have evolved from mere cybersecurity issues to 


instigators of financial losses, reputational damages,

and profound erosion of customers' trust.


Data breaches are caused by weak and stolen passwords,  physical attacks, insider threats due to the misuse of privileged access, etc.


How To Prevent Data Breaches

  • Software updates:

Running regular software updates is vital in preventing data breaches.

If you don’t update the software you will have

security weaknesses in the program that can be misused by hackers.


Here is a guide to updating the Microsoft Windows 



  • Password hygiene

Each of your online accounts should have a strong, complicated, and unique password.


Password reckoning or guessing  is another method used by Cybercriminals. 


Weak, short, and Reused passwords are helpless to guessing.


Change Password Regularly.

  • Identify All Sensitive data

Security professional argue that you can’t secure what you do not know you have.


Identify areas that store, transmit, collect, and process your sensitive data.

  • Educate your employees:

It’s important to Educate your employees.


You can enlighten them by helping them understand how to create strong passwords, how often they should change passwords


and help them site, dodge, and report scams, etc


2. Man-in-the-middle (MITM) attacks


This is a cyber attack in which a threat actor puts his or herself in between two parties: the user and the application,


to intercept their communication and data exchanges and use them for opposing goals like making unauthorized buys and hacking.


Here are a few signs that indicate an MITM attack when browsing a website


How to prevent Man-in-the-Middle attacks

  • VPN

A virtual Private Network is a digital connection between your computer and a remote server owned by a VPN provider that encrypts your personal data and masks your IP Address.


VPNs are one of the ways to protect corporate data and manage users' access to that data.


2. Social Engineering

Social engineering is a tactic that manipulates people to share 


information they should not share, visit websites they should not visit,


download software they should not download, and send money to hoods.


How to Prevent Social Engineering Attacks

  • Check the source

Take some time to think about where the communication is coming from,


 DO NOT TRUST IT BLINDLY.


For instance, if you do not know the sender of an email, there is no need to open the email.


If an email has errors then it is definitely fake.

  • Spam filters:

These are algorithms designed to detect or Identify undesired, dangerous, and infected emails.


Create a Spam filter so you can avoid getting infected emails and letting a link Determine where you arrive.


Here is a guide on how to Create a Spam filter



In Conclusion,

it is essential to stay updated on cybersecurity threats and their solutions


as Cyber criminals are becoming more sophisticated, and these threats are frequently developing.


Follow me For More!!

Joy Michael

Mar 2, 2024

Listen up! My roommate in my university days received an email telling her to follow certain instructions and give her last four credit card numbers in order to resolve some bank concerns. She was duped out of the money in her account because, as a gullible young lady, she followed instructions without first verifying if it was safe to send out her information. This is allegedly a cyberattack! With the help of cybersecurity, it may have been avoided.

What is Cybersecurity?
Cyber security is the process of protecting networks, computers, servers, mobile devices, electronic systems, and data from malicious attacks.

6 types of Cybersecurity are:

1. Network security is the protection of the integrity and privacy of computer networks and their data.

2. Application security: The goal of application security is to prevent threats

3. Information security protects the integrity and privacy of data, both in storage and in transit.

4. Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.

5. Cloud Security: Ensuring the security of data, applications, and infrastructure in cloud computing environments.

6. Identity and Access Management (IAM) : This is the process of managing and limiting user access to resources and systems while making sure that authorization and authentication processes are strong and dependable.

Cybersecurity is essential to our day-to-day operations because it protects our digital assets, privacy, and general well-being in the digital age, Our protection is provided against a range of dangers, including financial fraud, identity theft, data breaches, and malware assaults. Individuals, companies, and governments are exposed to serious threats that could impair operations, compromise confidential data, and result in financial losses if proper cybersecurity safeguards are not in place. 


Be informed there's such a thing as Cybersecurity and start securing your data and information today! Loss is painful!


My name is Queendaline please turn up notification button and follow me for more writings.


Picture credit: Getty images


Queendaline Ifeoma

Feb 18, 2024


I know we've seen movies where two people come together and boom, everything has worked out and they are living happily ever after. I know we've seen movies where two people come together and boom, everything has worked out and they are living happily ever after. 


Not to discredit anyone but those love stories and Telemundo are not even helping matters.


To build a healthy love life you must recognize that "Love is 99% work and 1% butterflies" 


Building a strong and healthy relationship shares some principles with cybersecurity, focusing on trust, communication, and protection. 


Here's a metaphorical guide by a cybersecurity analyst to make love work:


1. Establish Trust:

   - Just as trust is crucial in cybersecurity, it's vital in relationships. Be honest, transparent, and reliable to build a foundation of trust.


2. Communication is Key:

   - In cybersecurity, clear communication is essential. 

   Similarly, open and effective communication is critical in relationships. Discuss feelings, concerns, and expectations openly.


3. Regular Checkups:

   - Regularly assess and update your relationship, similar to cybersecurity audits. 

  

Evaluate what's working well and address any vulnerabilities or issues promptly.


4. Secure Your Boundaries:

   - In cybersecurity, setting boundaries protects systems. In relationships, establish and respect personal boundaries to ensure a healthy and secure connection.


5. Backup and Recovery:

   - Prepare for challenges in love, just as in cybersecurity. Have strategies to handle conflicts, and learn from experiences to recover and strengthen the relationship.


6. Vigilance Against Threats:

   - Be vigilant against external influences that may impact your relationship negatively, just as you would defend a system against cybersecurity threats.


7. Continuous Improvement:

   - As cybersecurity measures evolve, strive for personal and relational growth. Learn from experiences and adapt to changing circumstances to ensure a thriving relationship.


8. Collaboration and Teamwork:

   - In both cybersecurity and relationships, teamwork is crucial. Collaborate, support each other's goals, and face challenges as a united front.


Remember, building a successful relationship involves emotions, empathy, and understanding. 


It's essential to approach love with genuine care and respect for your partner


In the same way, embrace the reality of putting in the work to live in a cyber-secured world.

Follow me for insights like this.  


Disclaimer: I have no copyright to the image attached to this article. 


chioma victoria

Feb 17, 2024

What are Cyber threats?


Cyber threats or cyber security threats are actions that pose harm to digital systems. These actions seek to destroy, steal or weaken digital life in general.


Some of these threats include:


• Ransomware is a type of malware that encrypts the data of the victim, rendering them inaccessible, until a ransom is paid (mostly in cryptocurrency) before access is granted.

• SQL injection (SQLi) is a malware that allows cybercriminals to use a malicious SQL code to access and modify private information of the victim.

• Man in the middle is a type of attack where a person secretly eavesdrops and intercepts a conversation between two parties.The attacker monitors and can perhaps change the messages.

• Phishing is a type of attack that aims to deceive the victim by pretending to be a trusted person or family member. We have email phishing, voice phishing, amongst others.

• Denial of Service is a cyber threat that aims to shut down a system, network or machine and prevent access to it.

While there are many types and kinds of cyber threats, the most common ones have been explained above.


Protecting your device against Cyber threats.


These are very useful tips to keep your device protected from the different kinds of cyber threats.

1. Always keep your software and systems updated: Updates often include patches and security fixes that address vulnerabilities, reducing the risk of exploitation by hackers. Regularly installing updates helps maintain the integrity and safety of your system.

2. Make use of Multi-Factor Authentication (MFA): This provides an additional safeguard which helps protect against unauthorized access, adding an extra layer of verification beyond just passwords. It is especially effective in enhancing security for sensitive accounts, including those involving payments and financial transactions.

3. Check the strength of your passwords: Using complex and unique passwords is essential for enhancing security. A combination of numbers, uppercase and lowercase letters, and symbols makes it more challenging for unauthorized individuals to guess or crack your passwords. Avoiding password reuse is also crucial, as it prevents potential compromises if one account is compromised.

4. Be cautious of random emails and links: Avoid clicking on links or opening attachments in such emails to prevent potential phishing attacks or the spread of malware. Verify the sender's identity before interacting with any unfamiliar emails to enhance your online security.

5. Antivirus software is also important in keeping your device safe: Antivirus programs like Malwarebytes and Avast help protect your system by detecting and preventing malicious code or software that could potentially harm your computer. They play a crucial role in safeguarding against various cyber threats.

6. Use a firewall: A firewall is a security device that helps to monitor traffic in one's network. It prevents unauthorized access into the computer network and blocks potential attacks before they can cause harm. It's a crucial component in the overall security strategy for protecting your network and systems.

7. Enable data encryption if not already enabled: Data encryption is a key tool for maintaining the privacy and security of sensitive information, including data and photos. It transforms the data into a coded format that can only be deciphered with the correct encryption key. This adds an extra layer of protection, making it harder for unauthorized individuals to access or understand the encrypted content.

8. Make sure stolen devices can be traced, secured or erased: To do this, ensure it has tracking features activated like, Find My Device (Android) or Find My iPhone (iOS). Regularly back up data to easily restore or remotely wipe if needed.

In conclusion, cyber threats are prevalent in cyberspace, so it is paramount that we keep our devices protected to prevent them from being attacked. 


React, comment and follow for more informative content.




















Reliev Ojike

Feb 15, 2024



Did you know that over 80% of hacking-related security breaches are due to weak or stolen passwords?


Imagine waking up one morning to find that all of your online accounts have been hacked.


Your email, your bank account, your social media - everything is suddenly at risk.


Your entire life is exposed and vulnerable.


The culprit? A weak password.🤦‍♀️


A strong password is the first line of defence against hackers.


It's like a digital lock that keeps your information safe and secure.


Without it, you're leaving yourself open to all kinds of risks.


So the next time you're creating a password, make sure it's strong and secure.


Weak passwords are like a door with a broken lock - anyone can walk right through and take whatever they want.


But strong passwords are like an impenetrable fortress, keeping your information safe and secure.


So the next time you're choosing a password, don't settle for something weak and easy to guess.


Instead, choose a password that's strong and unique, and protect yourself from the risks of using weak passwords.


BENEFITS OF STRONG PASSWORD

  • Increased security: Strong passwords make it much harder for hackers to access your information.
  • More peace of mind: With strong passwords, you'll worry less about your digital security.
  • Lower risk of identity theft: With stronger passwords, you're less likely to be a victim of identity theft.
  • Faster account recovery: If your account is ever compromised, you'll be able to get it back more quickly with a strong password.


HERE ARE SOME TIPS FOR CREATING STRONG PASSWORD:

  • Choose a password that's at least 8 characters long.
  • Use a mix of uppercase and lowercase letters, numbers, and special characters.
  • Avoid using personal information, like your name or birthday.
  • Avoid using common words or phrases.
  • Avoid using the same password for multiple accounts.
  • Use a password manager to help you keep track of your passwords.


There are several technologies that are making passwords stronger and more secure.


Here are a few examples:

  • Biometrics.
  • Multi-factor authentication.
  • Password manager.
  • Encryption.


So, what can you do to protect yourself?


Start by changing your passwords today.


Use a unique password for each account, and make sure they're strong and secure.


You can keep your information safe from hackers and cyber criminals.


It's worth remembering  that while strong passwords are important, they're not the only way to keep your information safe.


Other important steps include using antivirus software, being careful about what you share online, and staying up to date on the latest security news and threats.

But by starting with strong passwords, you'll be taking a big step towards protecting your digital life.





Favour Uchenna

Feb 15, 2024

Two weeks ago, I woke up to my dad screaming “who is that, how did you get in”. It was 3am. How did this individual get into the compound, who left the gate open?.



Thankfully, there was no one in the compound. A strong wind blew the gate open.


 Apparently, my younger cousin, who was in charge of locking the gate every night, forgot to do so.


However, she woke my dad up with the phrase “an intruder is in the compound” That sent him into a panic mode.


So, how did he get in,  did  you leave the gate open?. Yes, she did.


Just like my cousin, a lot of organizations have left their critical information infrastructure open to cyber attacks.


 This has led to the loss of  sensitive data, reputational damage, and loss  of billions of dollars.


In this article, we will be showing you how to identify  and protect your Infrastructure critical information infrastructure, from cyberattacks.

Let’s jump in!


Identify Your Organization’s Critical Asset

“You cannot secure what you don’t know you have”. In securing your organization’s asset, you have to first identify your asset.


What is an Asset?

An asset is something of either tangible or intangible value that is worth protecting.


More specifically, an asset is anything of value to the enterprise in the delivery of its mission or business strategy that can be affected by an event that can lead to business or mission impact.


Identifying your organization’s asset, threats to those assets and the vulnerabilities that the assets contain is the first and important step to take in protecting them from the risk of an intrusion


Examples of organization’s assets includes; People, Information,Infrastructure, Reputation and Finances. Find out more about these assets in the next section.

People

People are assets that include employees, contractors, staffing providers and third parties.


Many enterprises are vulnerable to the loss of a key employee who may be a single point of knowledge and the only person with knowledge in a certain area or specific expertise.


Failure by management to identify key employees and ensure that they are supported through cross-training and incentive programs are unfortunately common.


Whether a loss occurs as a result of retirement, illness or recruitment by another enterprise, it may leave the enterprise in a precarious and vulnerable position.


Information

Information assets are essential to an enterprise’s business and exist in many forms.


They can be printed or written on paper, stored electronically, transmitted by post or by using electronic means, shown on films, or spoken in conversation.


Information should be protected against disclosure to unauthorized users (confidentiality), improper modification (integrity), and non-access when required (availability).

Information may be sensitive, critical or both; sensitive information must be protected from disclosure or modification, while critical information must be protected from destruction or loss.


The systems that host, process or transmit information (data) must ensure that information is protected at all times, in all forms and in all locations.


Infrastructure

Infrastructure assets include the physical infrastructure (e.g., facilities, equipment) and IT infrastructure (e.g., computing hardware, network infrastructure, middleware).


IT architecture components include information and applications.

New and outdated technologies pose a risk to an enterprise. 


With older technology, equipment that is no longer supported or past its mean time between failure (MTBF) may be particularly vulnerable.


Lack of patching and updating of systems and applications may leave them vulnerable to malware or misuse, and older systems may require expertise that is not readily available to maintain (potentially increasing key-person dependency).


When new technology emerges, your  organization needs to consider the following

  • Impact of adopting the technology (support, reliability, ease of integration)
  • Risk associated with operating the new technology (e.g., security, reliability)
  • Consequences of not adopting the new technology (e.g., obsolescence and lagging behind competitors)
  • Business benefits of the new technology (e.g., support for new business initiatives, effectiveness and efficiency gains)

Business Processes

A business process is an interrelated set of cross-functional activities or events resulting in the delivery of a specific product or service to a customer and can be considered an intangible asset.


Business processes are controlled by policies, procedures, practices and structures that create value to the enterprise and provide reasonable assurance that a business process will achieve its objectives.


Inefficient or ineffective business processes may make an enterprise less competitive in the market and lead to financial, market share or reputational loss.


Reputation

Reputation is an Intangible asset that is difficult to quantify. It represents the value an enterprise has derived from its past actions, positive or negative in nature.


The impact of various events and decisions often have an impact on reputation.


A shared understanding of I&T-related failures, compromises, mistakes or events can impact enterprise objectives and result in the loss of direct costs (e.g. financial), or indirect (e.g. customer sensitive) information resulting in reputational damage.


Significant reputational damage or lowered expectations on the part of stakeholders can also result when senior management is thought to be accountable, but fails to take corrective action, or does not adequately represent the corrective action to constituents.


An enterprise’s compliance record can also significantly either positively or negatively affect its reputation in the community and marketplace.

Finance

Financial assets are those that typically show up on an enterprise’s balance sheet and include items such as cash, investments, or accounts receivable.


They receive their value from a contractual claim. Financial assets are subject to many types of risk including market (e.g., currency, interest rate or commodity), credit (e.g., cash flow, regulatory or callable loans) and operational (e.g., inadequate systems or controls, employee errors or system failures) risk.


Nearly every type of risk can have an impact on financial assets of the enterprise.


Having identified your asset, the next step is to protect them against cyberattacks. In this final section, we have highlighted some key steps you can take to protect your organization’s assets from hackers.


3  Steps To Take In Protecting Your Organization’s Asset From Cyberattacks

  • Secure  Your Infrastructure : These includes physical and IT infrastructure.

Physical infrastructure should be protected using fences, barriers, turnstiles, locks  and other features.

IT infrastructure can be protected automatedly from unauthorized access or misuse.Ensure that your networks and database are protected using  firewall and encryption.


Regular updating and patching of system software are also very important.

  • Educate Your Employees: Regular training and simulation exercises should be carried out within your organization.

Talk to your employees about their role in securing and protecting the information of their colleagues, customers, and the company.

Set policies in place so they know what practices are acceptable and unacceptable.


Limit the number of users within the company who will have administrative access.


This will minimize the amount of programs they will be able to download, therefore, minimizing the risks of downloading viruses and malicious software

  • Establish Security and Procedures: This will protect your company from cyber attacks and provide guidelines for resolving issues if they arise.

Outline how situations will be handled and the consequences if an employee violates the policies.


Control physical access to company devices and dispose of them properly. Prevent access to company computers and handheld devices from unauthorized users.


Laptops and cellphones are easy targets for cyber theft since they can be misplaced easily or stolen quickly.

Reset devices that are being disposed of back to factory setting. Never get rid of a cellphone or laptop without completing this step.


Failure to do so could result in company information winding up in the hands of the cyber criminal.


Conclusion

The number of cyber threats and attacks are increasing by the day. It is therefore important that organizations strengthen their efforts to combat cyberattacks.


There should be no loose ends, no door/ gate left open. Cyber criminals are always looking for the slightest opportunity to strike. It is the responsibility of the organizations to ensure that all organization assets are protected.

Faith Atabo

Feb 15, 2024

You do not need to have prior knowledge of cybersecurity or any other tech related skill before transitioning into the Industry.


All you need is to have; a voracious appetite for learning, a good laptop and plenty amount of data


In this article, I will be shedding light on how I was able to transition into cyber security in 9 months without paying “shishi”.


It's a long read, let's dive in!


Getting Started

The first step is to decide what kind of career you want in the first place. 


 Cybersecurity profession opens up a world of possibilities. So you have to decide what area of cyber security you want to specialize in.


Career path in cyber security includes: GRC( Governance, Risk and Compliance), SOC, Vulnerability Assessment and Penetration Testing, Digital Forensic


Before making your final decision on your area of specialization, ensure you understand your strengths and weaknesses and what area of specialization fits your interes.


I encourage you to carry out proper research before taking any step.


Get A Cybersecurity Qualification Or Certification

A number of organizations and platforms like ISC2, INFOSEC, Tryhackme.com offer free beginner self-paced learning. 


You can take advantage of any of these platforms to kick start your cybersecurity journey.


Organizations like ISC2 also provide a free certification exam voucher for newbies. 


  Take advantage of this learning opportunity by visiting their website (ISC2)


Non-technical cyber security roles are also in high demand. In the next section, I have careful highlighted some key roles you could consider. Let’s look at 7 of them.


7 Non- Technical Cybersecurity Roles, Number 2 Is My Favorite

  • Cyber Security Analyst: Security analysts are responsible for identifying, assessing, and managing cybersecurity risks.  

They may also develop and implement cyber security policies and procedures, and conduct cyber security audits and assessments.

  • Information Security Officer (ISO): ISOs are responsible for developing and implementing an organization’s overall cyber security strategy.
  • They may also oversee the organization’s security team and budget, and work with other departments to ensure that security is integrated into all aspects of the organization.
  • Cyber Security Risk Manager: Security risk managers are responsible for identifying, assessing, and managing cybersecurity risks.
  • They may also develop and implement risk management plans and procedures.
  • Security Awareness and Training Specialist: Security awareness and training specialists are responsible for developing and delivering cybersecurity awareness and training programs to employees.
  • They may also work with employees to help them identify and mitigate cybersecurity risks.
  • Security Consultant: Security consultants provide cybersecurity consulting services to organizations.
  • They may help organizations to develop and implement security policies and procedures, conduct security audits and assessments, and train employees on cybersecurity best practices.
  • Security Sales Engineer: Security sales engineers are responsible for selling cybersecurity products and services to organizations.
  • They may work with customers to understand their security needs and recommend solutions that meet those needs.
  • Security Marketing Manager: Security marketing managers are responsible for developing and executing marketing campaigns for cybersecurity products and services.
  • They may also work to raise awareness of cybersecurity issues and promote best practices.

6 Easy Ways You Can Prepare YourSelf For These Roles

  • Look for cybersecurity certifications.
  • Network with people in the cyber security industry.
  • Volunteer your time to a cyber security organization.
  • Set up job alerts.
  • Attend a cybersecurity bootcamp.
  • Gain hands-on experience.

Final Thoughts

Cybersecurity is a multibillion dollar industry with a lot of competition. 


You’ve to be physically and mentally prepared, when transitioning.


Remember to take a break from time to time, because the journey ahead is a fierce one.


Lastly, don'r forget to have fun along the way

Faith Atabo

Feb 15, 2024


In an era where our lives are intricately woven into the digital fabric, the importance of cybersecurity has never been more apparent. From online shopping and social media to remote work and virtual hangouts, our daily activities are increasingly dependent on the vast realm of cyberspace. As we revel in the convenience of the digital age, it's crucial to acknowledge the lurking threats that can turn our virtual utopia into a nightmare.


The Digital Playground: Where We Live, Work, and Play


Picture this: you're sipping your morning coffee, scrolling through your favorite social media feed, when suddenly, a notification pops up claiming your account has been compromised. It's the virtual equivalent of a break-in, and the consequences can be just as devastating. Cybersecurity is not just an IT concern anymore; it's a necessity for every individual navigating the digital playground.


The Anatomy of Cyber Threats


Cyber threats come in all shapes and sizes, much like the wild creatures in a jungle. Malware prowls in the shadows, phishing emails masquerade as friendly faces, and ransomware strikes like a venomous snake, encrypting your data until a ransom is paid. Understanding the anatomy of these threats is the first step in building a sturdy defense against them.


Passwords: The Gatekeepers of Your Digital Kingdom


Your passwords are the gatekeepers to your digital kingdom. Yet, many of us still opt for easily crackable combinations like "123456" or "password." It's time to fortify our defenses by creating strong, unique passwords and embracing the added security of two-factor authentication. Remember, a strong password is like a moat around your castle – the wider and deeper, the better.


The Human Element: Our Greatest Strength and Weakness


While technology continues to advance, the human element remains both our greatest strength and weakness in the cybersecurity battle. A simple click on a suspicious link can unleash chaos, but an educated and vigilant user can thwart even the most sophisticated attacks. Stay informed, question the unexpected, and practice digital hygiene to minimize the risk of falling prey to cyber predators.


The Evolving Landscape of Cybersecurity


As technology evolves, so do cyber threats. What worked yesterday may not be sufficient today. Keep your cybersecurity knowledge up-to-date, invest in reputable antivirus software, and regularly update your devices. Think of it as staying one step ahead of the game – the digital game, that is.


Conclusion: Navigating Safely Through the Digital Jungle


In this interconnected world, the digital jungle can be both thrilling and perilous. Cybersecurity is not a one-time affair; it's a continuous journey of learning, adapting, and safeguarding our digital existence. By embracing best practices, fostering a cyber-conscious culture, and being proactive in our approach, we can confidently navigate the digital jungle and enjoy the wonders it has to offer without fear of lurking threats. After all, in this vast cyberspace, knowledge is not just power; it's security.

Chioma Ezeah

Feb 11, 2024
Home
Business Hub
Market Hub
You
By signing up you agree to ourTerms|About us|Market Hub|Business Hub|Deals Hub