
Faith Atabo

Faith Atabo
@Tech_storyteller
I write to break down technical jargons into interesting, understandable and simpler forms.
Posts
Articles
Pinned
Faith
On-Demand Delivery Service Versus Standard Delivery Service
In Previous years, postage received letters and bills from friendly postmen on motorcycles. As time passed, it has evolved to meet the demands and expectations of the industry, driven by consumerism. This evolution has brought to life so many delivery options and services in the logistics sector. On-demand delivery and the standard courier delivery service are two of the most popular delivery methods.
On-Demand Delivery Service
On-demand delivery is a service that allows you to have almost anything you want or need be delivered at any time you desire to any location you choose. Everywhere you go, you will find on-demand delivery motorcycles on the road or lined up at commercial areas delivering food, groceries, documents and so much more.On-demand delivery is one of the most used delivery services, so much so that it has become a part of everyone’s daily life. Why? The keyword is instant gratification. It fulfils consumers’ needs immediately within short delivery time, something that has become increasingly prevalent in today’s society.
Why It May Be The Best Option ?
Are there other benefits of on-demand delivery, other than instant gratification? ; Yes!, Real-time Tracking System.
Once you place your order, it will allow you to track your shipment live. It also gives you an estimated delivery time so you know when to expect it. The delivery time given is often fast and accurate, so you can plan your day to day activities accordingly. On-demand delivery is also useful if you need to deliver something urgently, such as a critical document that must be delivered to a client in a nearby town.
Two Common Challenges Faced With On-Demand Delivery Services
The charges are determined by the size of the item that needs to be delivered, where bigger items may result in a more expensive delivery cost than smaller items.
During peak timings, there may be shortage of delivery riders and drivers which can lead to a longer “wait” time. The increase in demand at t
Reactions
1
Faith
5 Delivery Service Mobile Applications That Are Fast and Easy To Use : Kwik Pik Delivery Service Mobile App Is The Game Changer
Delivery services can be a quick and convenient way to get your shipments delivered straight to your door.
There are a variety of ways to order and pay for goods, however, delivery service apps make things quicker, faster and more convenient.
There are many factors to consider when deciding on a delivery service that is right for you.
These Factors includes:
Availability : Are they available within your Country or Region
Selection :Certain “Apps” have partnered with a wide range of businesses that include various ordering options
Range of available items :Some apps offer many different types of items.
Additional Fees: We prioritized apps that charge fewer fees to help us get the most bang for our buck.
Convenience :All apps provide a convenient and time-saving way to order delivery remotely
Here Are 5 Of The Top Delivery Service Mobile Apps..
Bowmenn :Bowmenn trucking is a smartphone app that matches carriers with shippers. bowmenn puts drivers first by making it easier than ever to find and book loads with trucks, pickup trucks, and cargo vans. Getting a load is made simpler, because the price you see is the price the customer paid.”
Darum :Darum is a on-demand dispatching service that is available in Lagos, Nigeria. With a network of registered courier firms, you can now send a parcel to any address in the city at any time and anywhere. All you need to do is launch your app and select your pickup and delivery address, and a dispatch rider nearby will help you get it done.
GIGGO: The GIGGO app allows users to quickly and easily ship their goods from their homes and offices, reducing the need to constantly wait at pickup locations. Once a request is made, the app locates a delivery partner closest to it and assigns the delivery request for pickup. The GIGGO app allows you to track the delivery partner on his way to pick up your parcel, ship multiple items to the same address, and track the delivery status of each shipment.
Kwik PIK
Reactions
2
1
Faith
Look Before You Leap! “ What You Need To Know Before Transitioning Into The Tech Industry “
A lot of Folks these days are transitioning into the tech industry, it seams like a trend .
While transitioning into tech offers you a vast amount of opportunities, it's important for you to know what you are getting into before you start your Journey
Here Are A Few Things You Can Learn From My Own Journey
1. Be Prepared Not To Give Up : Every Industry has its own perculiar challenge. The tech industry can be even more challenging for you coming from a "non-tech background " But you must understand that "nothing good grows in a comfortable environment" I heard that statement from Mrs Confidence Staveley, CEO, Cyber Safe Foundation. It did not mean much to me until I started the 7 month intensive course in March. The tech industry is not an easy one , so you must come prepared not to "chicken out"
2. Ask A Lot Of Questions: Google and YouTube should be your biggest allies. Find people who know more than you do and ask them the right questions so you won't lose your way ..
3.Be Involved In A Community Of Like Minds: This is of utmost importance and will make your journey a lot easier . Being in a community has helped me immensely. It's part of the reason why I am enjoying my cybersecurity journey. The support and encouragement you get from such communities will contribute to your success in the industry
4. ENJOY EACH MOMENT AND HAVE FUN!
Reactions
Faith
Turn Off Your Location!
Last month, I got a message from my friend and it states " Faith turn off your location on Twitter, you teach us Cybersecurity but here you are making the same mistake " 🥴
Something as little as "turning off your location" when you post on your social media platforms can save you from potential threats
Turning off your location on your social media platform is a quick and easy step
👉🏻 First, go to your profile page on your social media platform
👉🏻click on settings
👉🏻select privacy and safty
👉🏻select location
👉🏻select Disabled
vula! you are all done. This procedure may varry from app to app, but it is really easy to navigate .
Go ahead and "turn off your location"
cheers!
Reactions
1
3
Faith
Are Your Crypto Currencies Safe ?
As the popularity of Cryptocurrency increases - a new form of malware (malicious soft) has emerged called Cryptojacking.
What is Cryptocurrency? : They are digital currency (e.g. Bitcoin, Ethereum) that can be used in exchange for goods, services, and even real money. Cryptocurrency can be purchased or earned through “mining”.
The term Mining, involves using a computer to solve complex, encrypted math equations in return for a piece of cryptocurrency.
What is Cryptojacking: Cryptojacking occurs when cybercriminals use a victim’s computer, tablet, or mobile device to mine for cryptocurrencies without their knowledge. Unlike most other types of malware, cryptojacking scripts do not normally cause damage to victims’ data. However, Cryptojacking does slow down a victim’s computer and internet connection and can cause battery drain.
How Does Cryptojacking occurs?
Malicious Applications: Hackers trick victims into loading crypto-mining code onto their computers, through phishing-like tactics. Victims receive a legitimate-looking email that encourages them to click on a link that installs crypto mining software that runs in the background.
Malicious Websites (Drive-by cryptojacking): Victims visit a site that runs a malicious script or is hosting a malicious advertisement. The script can do one of two things:
If the website is open, the user’s computer can be used to actively “mine” for cryptocurrency. This "Drive-by" attack can compromise any device with a web browser.
The website can use a script to install a malicious application without your knowledge
Github: GitHub is a web-based platform for collaborative software development (software can use code shared on GitHub). Some Hackers will take code that is shared and hide cryptojacking malware within a fork of the project.
How Can I Prevent Cryptojacking Malware
Here are some helpful preventive measures
Reactions
Faith
9 Free Softwares For Cybersecurity Enthusiasts
For my cyb ethusisast, Here are 9 soft ware you can install for free!
1.For Operating System- Kali Linux
2. Email Security -Deshashed
3.Web Hacking -Burp suite
4.Port Scan-Nmap
5.Training -Hack the box
6.Data Mordification-Cyber chef
7.Intrusion Detection System-Snort
8.Firewall/Router-Pfsense
9.Debugging-Ghidra
Reactions
Faith
It’s Your Fault- 8 Ways You Could Be Inviting CyberAttackers To Your Organization
Here are 8 possible ways you can be inviting a cyberattack
1. Invisible systemic risk
Businesses, Organizations and Individuals make decisions every day that negatively impact their security readiness: for example, refusing to shut down a server for proper patching or choosing to keep working on old hardware and software to save budget. These unreported decisions lead to a false sense of security and increase the likelihood and severity of an incident.
2. Cultural disconnect
Non- IT folks still see Cybersecurity as something that is “just there,” like air or water. This means it isn’t considered a part of business decisions.
3. Throwing money at the problem
You can’t buy your way out — no matter what you spend, you won’t be perfectly protected against cyberattacks. By trying to stop every risky activity, you will likely damage your organization’s ability to function.
4. Security as “defender”
If security officers are treated as (and act as) defenders of the organization, it creates a culture of no. For example, they might block the release of a critical application due to security concerns without considering the business outcomes the application supports.
5. Broken accountability
Accountability should mean that a decision to accept risk is defensible to key stakeholders. If accountability means that someone will get fired if something goes wrong, no one will engage.
6. Poorly formed risk appetite statements
Organizations create generic high-level statements about their risk appetite that don’t support good decision making. Avoid promising to only engage in low-risk activities, as this can create invisible systemic risk
7. Unrealistic social expectations
When a headline-grabbing security incident happens, society just wants heads to roll. While this isn’t fair, it’s the result of decades of treating security as a black box. No one understands how it really works and as a result, when an incident does occur, the assumption is that someone must have
Reactions
Faith
4 Quick And Easy Defense Mechanism Against Ransomware Attack
Ransomware is everywhere!
Here are four immediate measures that can be taken to defend against ransomware attacks:
1.Update your operating system and software.
- GET WEBOUNCER
2. Implement user training and phishing exercises to raise awareness about the risks of suspicious links and attachments.
- No need with Webouncer's Phishing Eliminator which automatically removes malicious links/attachments in emails
3. If you use Remote Desktop Protocol (RDP), secure and monitor it. - Webouncer takes care.
4. Make an offline backup of your data. - Webouncer takes care of it.
Hope You Learnt Something!
Reactions
1
Faith
A Good Book to Read- If You’re Considering Starting A Career In Cybersecurity
"I discovered that one of the challenges cybersecurity beginners encounter is their inability to stand out and be positioned for career opportunities. The book contains insights that will overcome this challenge."- Segun E.Olaniyan
"The Visibility Play Book For CyberStarters" Written By Segun E.Olaniyan, released few hours ago is a handy book to repositioning your cybersecurity career for opportunities.
This Classic book is absolutely FREE and according to the writer was written with the burden to see you thrive and succeed in your cybersecurity career.
Clich Here to get your free copy or visit https://selar.co/cwuh
Reactions
3
Faith
Acer Has Been Hacked- Lost Over 160GB Of Data
Acer is a global Taiwanese company that produces Hardware and Electronics.
Few moments ago, Acer, admits that one of its servers has been compromised. Hackers broke into the document server used by repair technicians and stole 160GB of Data which was later sold .
Although, according to Acer, the finding of this preliminary inquiry do not show that this security problem has affected consumer data
Reactions
3
Faith
PHISHING! PHISHING! PHISHING
Phishing is one of the most common and most used form of social engineering!
However, they can be very tricky to detect.
Below are simple ways you easily detect them!
Reactions
Faith
10 Easy Tips To Prevent Malware
A Malware is also known as a malicious software.
It is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
How do I prevent malware?
The diagram below shows you 10 easy ways you can prevent a Malicious Software.
Your Welcome 🤗
Reactions
Faith
The Roadmap To Cybersecurity! What You Need To Know
Hey!
I know you like "summary ".It seams like I know you too well. Yes I'm that good.
So you want to go into Cybersecurity just like me?,below is a pictorial representation of the road map to Cybersecurity.
Dont forget to thank me on the comment section!
You are Welcome 🙏
Reactions
2
Faith
Beware of Public Wi-FI-Hotspot
I know you like free things, I mean who doesnt🤷♀️, I do too 🙊. But they are a lot of risks involved in using Public Wifi-hotspot
While it is not a guarantee that you will run into security threats when using public Wi-Fi, it is crucial to be aware of the risks involved and take the proper precautions to stay secure online.
Here is a little story of Alec Daniels, an 86 years Old hacker Who sat down at his local coffee shop and in less than 17 minutes,Alec had taken over the cafe’s public Wi-Fi hotspot and distributed phishing emails to everyone connected to the network.
The good news, is that Alec is an ethical hacker (a hobbyist who hacks to highlight cybersecurity vulnerabilities). The bad news? Not every hacker is here to help.🧐
Whether you’re logging on to check your bank statements or working remotely from a cafe, hotel, or airport using public Wi-Fi poses security risks that few people take seriously.
According to a 2022 survey
Do You Know
Without proper precautions, hackers can take advantage of public Wi-Fi’s lax security to spy on you, steal your personal information and passwords, or even take over your online accounts🤔
5 Ways Public WiFi Can Get Hacked!
1.Evil twin” attack☠️:Hackers can set up malicious hotspots with seemingly trustworthy names (e.g. “Cafe free Wi-Fi”). When you connect, they can easily intercept your data.
2.Man-in-the-middle attack (MitM): Bad actors break into a network and eavesdrop on data as it travels between connected devices and the Wi-Fi router. For example, as you enter your password into your online bank account.
3.Password cracking attack: Scammers use software that automatically tries a huge volume of usernames and passwords to unlock a router’s management interface.
4.Packet sniffing attack:
Malicious hackers capture data units sent across unsecured Wi-Fi. Then, they unpack the data to extract individual login credentials or financial information.
5.Security vulnerabilities and/or misconfigurations:
Reactions
2
1
Faith
Great News For Android Users!! Google takes a step Forward In Protecting Your Privacy
Google announced on Tuesday that it's officially rolling out Privacy Sandbox on Android in beta to eligible mobile devices running Android 13🎊
"The Privacy Sandbox Beta", will provide new APIs that are designed with privacy at the core, and do not use identifiers that can track your activities across apps and websites.
The search and advertising mogul stated, "Apps that choose to participate in the Beta can use these APIs to show you relevant ads and measure their effectiveness."
Devices that have been selected for the Beta test will have a Privacy Sandbox section within Settings so as to allow users to control their participation as well as view and manage their top interests as determined by the Topics API to serve relevant ads.
The initial topic taxnomy is set to include somewhere between a few hundred and a few thousand topics, according to Google, and will be human-curated to exclude sensitive topics
The Beta test is expected to kick off with a "small percentage" of Android 13 devices and will gradually expand over time.
The Privacy Sandbox on Android is Google's answer to Apple's App Tracking Transparency (ATT), which requires app developers to seek users' explicit consent before tracking their online behavior across apps and websites through unique identifiers. It was introduced by Apple in iOS 14.5.
This experiment is part of a broader initiative for the web that also aims to begin phasing out third-party cookies in the Chrome web browser by 2024.
The technology that underpins its ability to glean users' evolving interests is a machine learning technique called federated learning that decouples the "ability to do machine learning from the need to store the data in the cloud."
This effectively allows decentralized edge devices such as smartphones to learn a shared prediction model while keeping all the training data on device, thereby making it possible for websites to access information about consumers without compromising user p
Reactions
1
3
Faith
How Safe Are You?
This year's Safer Internet Day took place on Tuesday, 7 February 2023. Significantly, it was the 20th edition of the campaign.
The Safer Internet Day slogan of “Together for a better internet” encourages everyone to join the movement, to participate, and to make the most of the internet’s potential to bring people together. With a global, community-led approach, Safer Internet Day encourages everyone to come together and play their part. (It gets better when we do it together!👍)
There are many ways to do this...
Are you a young person?
As a young person, you are the main target of Safer Internet Day, but that does not mean you are a passive recipient of the collective effort towards the promotion of a better internet that takes place every February. In fact, there are a wealth of opportunities for young people to make their voices heard on matters relating to their safety and wellbeing in the online world, from contacting your national Safer Internet Centre or Safer Internet Day Committee and getting involved in their youth participation schemes, to becoming an advocate of Safer Internet Day on social media by sharing your experience of the digital environment and your aspirations for a better internet – You can also be the change you want to see in the (online) world by being kind and respectful to others online, by protecting your online reputation and that of others, and by seeking out positive opportunities to create, engage and share online.
Are you a parent or carer?
Parents and carers, you play a crucial role in empowering and supporting children and young people to use digital technologies responsibly, respectfully, critically and creatively. Indeed, parental influence, guidance and education have a significant and long-lasting impact on children’s safety and wellbeing in the online world. Therefore, there are plenty of ways for you to participate in Safer Internet Day, whether it is by ensuring an open dialogue with your children, educating t
Reactions
1
Faith
Congratulations! You Have Just Been Selected For The Federal Government COVID-19 Grant
Hi there!
Congratulations, You have been selected for th federal government COVID-19 Grant . Call Mr Chukuwdi on 08123255611 For more details . Ensure you have an Access bank account .You can click on Http//:fedgcovid.no.gg for more information!
What Is The Best Thing To Do With The Above
1. Call Mr Chukwudi after Clicking the URL
2. Click the url
3. Scammers at work, ignore the message and delete immediately!
4.call Mr Chukwudi and insult him😂
Kindly Leave Your best answer in the comment session bellow!!
Reactions
2
2
Faith
Everyone Is A Suspect (Part 2): Shine Your Eyes!
An insider threat may be executed intentionally or unintentionally.
No matter the intent, the end result is compromised confidentiality, availability, and integrity of an organization's systems and data.
Insider threats are the cause of most data breaches.Most times,traditional cybersecurity strategies, policies, procedures and systems focus on external threats leaving the organization vulnerable to threats From within .
Since the insider already has valid authorization to data and systems, it’s difficult for security professionals and applications to distinguish between normal and harmful activity.
How Can You Detect an Insider Threat
For secure cyber defenseagainst an insider threat, you have to keep an eye on anomalous behavioral and digital activity.In other words,shine your eyes wella 👀
Behavioral Indicators
There are a few different indicators of an insider threat that should be looked out for, including:
A dissatisfied or disgruntled employee, contractor, vendor or partner.
Attempts to circumvent security.
Regularly working off-hours.
Displays resentment toward co-workers.
Routine violation of organizational policies.
Contemplating resignation or discussing new opportunities.
Digital Indicators
Signing into enterprise applications and networks at unusual times. For instance, an employee who, without prompting, signs into the network at 3am may be cause for concern.
Surge in volume of network traffic. If someone is trying to copy large quantities of data across the network, you will see unusual spikes in network traffic.
Accessing resources that they usually don’t or that they are not permitted to.
Accessing data that is not relevant for their job function.
Repeated requests for access to system resources not relevant for their job function.
Using unauthorized devices such as USB drives.
Network crawling and deliberate search for sensitive information.
Emailing sensitive information outside the organiz
Reactions
3
1
Faith
Everyone Is A Suspect 1
Do you know?
Organisations can face malicious threats from people within, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
Insiders may have accounts giving them legitimate access to computer systems, this access may have been given to them to serve in the performance of their duties; these permissions could be abused to harm the organization.
Insiders are often familiar with the organization's data and intellectual property as well as the methods that are in place to protect them.
5 different types of insider threats
Malicious insiders. This group of insider threats often have an unsolved grievance against the company they work for, and they choose to take things into their own hands. ...
Careless employees. ...
third-party partners. ...
Ex-employees. ...
Policy evaders.
Reactions
2
Faith
Hackers Can Steal Your Information Through Your KeyPads- 3 Ways You Can Avoid That!
Is this Possible?
Emphatically yes! And this process is known as KEYSTROKE LOGGING.
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.
There are two main types of software keyloggers: user mode keyloggers and kernel mode keyloggers.
A user mode keylogger uses a Windows API to intercept keyboard and mouse movements.
A kernel mode keylogger is a more powerful and complex software keylogging method. It works with higher privileges and can be harder to locate in a system. Kernel mode keyloggers use filter drivers that can intercept keystrokes. They can also modify the internal Windows system through the kernel.
How Can I Detect And Remove Keylogging?
Due to the variety of keyloggers that use different techniques, no single detection or removal method is considered the most effective. Since keyloggers can manipulate an operating system kernel, examining a computer's Task Manager isn't necessarily enough to detect a keylogger.
This is why, you need
Security software, such as an anti-keylogger software program. It is designed specifically to scan for software-based keyloggers by comparing the files on a computer against a keylogger signature base or a checklist of common keylogger attributes. Using an anti-keylogger can be more effective than an antivirus or antispyware program. The latter may accidentally identify a keylogger as a legitimate program instead of spyware.
Depending on the technique an antispyware application uses, it may be able to locate and disable keylogger software with lower privileges than it has. Using a network monitor will ensure the user is notified each time an application tries to make a network connection, giving a security team the opportunity to stop any possible
Reactions
3
1
Faith
The Zombie Attack
A Zombie Network is a collection of compromised computers that are connected to the internet.
A zombie network is also called a BOTNET.
A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software.
How Do Hackers Use Botnet?
Hackers may use botnets to send spam, phishing, or other scams to trick consumers into giving up their hard-earned money. They may also collect information from the bot-infected machines and use it to steal identities and run up loan and purchase charges under the user's name.
What methods should I use in avoiding Botnet or a Zombie attack?
Keep your operating system up-to-date.
Don't open files from unknown or suspicious sources.
Scan all downloads before running the downloaded files, or find different ways of transferring files.
Don't click suspicious links.
Install an antivirus program.
How are botnets removed?
It's Very Simple!
Use antivirus software: A trustworthy antivirus tool will give you free botnet scanning and removal while protecting you against other types of malware as well.
If you find this article very useful, kindly leave a comment below 🔥
Reactions
1
Faith
Beware Of RATS!
What do you know about RATS?
They appear in your house without any invitation. They stay and carry out all their life cycle in your house and they do this SILIENTLY!
A remote access Trojan (RAT) is a malware program that opens a backdoor, enabling administrative control over the victim’s computer.
RATs are typically downloaded together with a seemingly legitimate program, like a game, or are sent to the target as an email
attachment( carefully check the link before you click on it).
Just like the Rats in our houses, a remote access trojan can exits well before detection and even remain after removal. ( Just like that Rat that died and has been smelling for days).
Once the attacker compromises the host’s system, they can use it to distribute RATs to additional vulnerable computers, establishing a botnet.
Here are several ways a RAT attack can endanger individual users, organizations, or even entire populations:
Spying and blackmail—an attacker who deploys RAT on a user’s device gains access to its cameras and microphones. They can take photos of the user and their environment, use it to conduct more sophisticated attacks, or to blackmail the user.
Launching distributed denial of service (DDoS) attacks—when attackers have RATs deployed on a large number of user devices, they can use these devices to flood a target server with fake traffic. Users are commonly unaware that their devices are used for DDoS, although an attack can result in network performance degradation.
Cryptomining—attackers can use a RAT to mine Bitcoin or other cryptocurrency on a user’s computer. By scaling their operation across a large number of devices, they can generate significant earnings.
Reactions
2
Faith
What Is Authentication
Imagine that you hear a knock on your door and peep through the door to be sure who is at the door before any attempt to let such a person in.
This is also known as Authentication.
Authentication is a process of verifying a user of an application or account. It is a system of double-checking to establish the credibility of a user trying to gain access to a computer or an account.
This exists to ensure that the real user maintains authority over specific secure systems (accounts, computers). You need to input your password before gaining access as a registered member of a platform.
Types of Authentication
1. Something You Know
This is as the name implies something you have in your mind, which is something you are cognitively aware of. The most popular of use case of this is the use of passwords. This is because they are easy to use, set up and maintain. Another example of something you know is the use of a PIN, which is the often the use of numerals for authentication, an example of this would be the PIN you set up for your ATM card. Security questions also fall into this category. These are questions you are asked when setting up an account, such as your mother’s maiden name, name of your pet. Etc. You are prompted to answer your chosen security question in the event that you cannot remember your password.
2. Something You Have
This is something you have in your possession that is used for authenticating your identity. This can be a physical object or a digital artifact on a computing device which is unique to you that provides a passcode or key. Popular examples of this are Hardware tokens, smart cards and Certificate based authentication which involves identifying users, devices, or machines via using digital certificates. A digital certificate represents your digital identity. It is an electronic document based on an existing driver’s license or passport. You provide digital certificates when you attempt to sign into a server. The ser
Reactions
3
Faith
5 Ways You Can Protect Your Information Saved On Cloud
Most Cloud data security flaws are caused by human errors such as; using unsecured WiFi connections and stolen login details.Even though cloud-stored data are already encrypted, additional security is possible and advised.
Below are 5 ways you can protect your information stored on cloud;
1. Read the user agreement: Before you click that “I agree to the terms and conditions” make sure you have adequately perused their user agreement. Be sure you understand how the service protects your information and whether by signing up you have given them permission to use or sell your information in anyway.
2. Use Two-Factor Authentication: This means additional information will be required if anyone signs into your account. Common methods of authentication include a Personal PIN number or inputting a code that the cloud provider emails or texts to you or the authentication app.
3. Identity and Access Management: You must set appropriate authorization levels. In addition to preventing employees from erroneously editing data, they are not authorized to access, access control also protects businesses from hackers.
4. Don’t store sensitive information on the cloud: Just because a service provider has a history of strong security, that still doesn’t warrant you storing sensitive documents on their platform. It is still a possibility that they could get breached but more likely that a leak could come from your end, either way, it is a bad idea.
5. Keep up with the latest security best practices and guidelines.
In addition to the above, the security of your data is riding on the Cloud Service Provider you select. Below are some guidelines for selecting a Cloud Services Provider
Reactions
2
2
Faith
The Cyber Counterattack!
Keep Your Enemy Closer...
Understanding the modules operandi of your enemy gives you an edge over them.
This is what the Cyber Killer Chain is about. It is an adaptation of the military's kills chain, which is a step by step approach that identifies and stop enemy attactivity.
It was originally developed by Lockheed Martin in 2011. The Cyber chain outlines the various stages of several common cyberattacks and, by extension, the points at which the information security team can prevent, detect or intercept attackers.
The cyber kill chain is intended to defend against sophisticated cyberattacks, also known as advanced persistent threats (APTs), wherein adversaries spend significant time surveilling and planning an attack. Most commonly these attacks involve a combination of malware, ransomware, Trojans, spoofing and social engineering techniques to carry out their plan.
The Cyber Kill Chain
Phase 1: Reconnaissance
During the Reconnaissance phase, a malicious actor identifies a target and explores vulnerabilities and weaknesses that can be exploited within the network. As part of this process, the attacker may harvest login credentials or gather other information, such as email addresses, user IDs, physical locations, software applications and operating system details, all of which may be useful in phishing or spoofing attacks. Generally speaking, the more information the attacker is able to gather during the Reconnaissance phase, the more sophisticated and convincing the attack will be and, hence, the higher the likelihood of success.
Phase 2: Weaponization
During the Weaponization phase, the attacker creates an attack vector, such as remote access malware, ransomware, virus or worm that can exploit a known vulnerability. During this phase, the attacker may also set up back doors so that they can continue to access to the system if their original point of entry is identified and closed by network administrators.
Phase 3: Delivery
In the Delive
Reactions
2
Faith
When an IOT- Based Device is Hijacked . Part 1.
Open Sesame!
Imagine living in a house, or working in an office, where everythings is controlled by the click of a button.
Imagine if that control button gets hijack by an unauthorised personal.
The result will be devastating, right?.
Every IOT technology user should be aware that 57% of iot based devices are vulnerable to cyber-attacks.Research studies shows that;cyber threats to iot- based devices can lead to serious reputational and economical consequences.
If a cybercriminal, hacks into an iot- based devic containing the data of an organization,he can leak out sensitive data or may even request for money in place of data (Ransomware).The worst scenario is a hacker selling sensitive information of the company on dark web.A cyber attack, may also weaken or disable the iot-based device on a large scale.
Reactions
2
Faith
Social Engineering Tricks And How To Stay Safe
vishing
1.Always confirm with whom your speaking with; if you don't know who the caller is, END THE CALL
2.Have a policy to not provide any information to an unknown caller, without first verifying the identity.
3.Verify an employee ID before answering any information to internal callers.
Impersonation
1.Have a strict physical security policy. Don't be too polite
2.Have a tech support identification
3.Dont allow delivery people into the office.
Phishing
1.Educate users on red flags and what to look out for.
2.Frequently carry out phishing simulation test, to keep awareness top of mind.
Reactions
1
Faith
What Have You Been Clicking
"Get 40GB free internet data in any network for 60 Days. Activate Now"
Don't Click that !
The above is a typical example of SMISHING. Smishing is a Phishing cybersecurity attack carried out over mobile text, also known as SMS Phishing.
In Smishing,victims are deceived into giving sensitive information to a disguise attacker. SMS Phishing can be assisted by malware or fraud websites. It occurs on many mobile text messaging platforms,including non-SMS channels like data -based mobile messaging platform like WhatsApp.
Before responding to messages online and via SMS, always confirm its authenticity. Remember,it's better to be safe than sorry!
Reactions
2
Faith
What Hackers Do When They Call You
"Hello ! Am Calling From Your bank"
When was the last time an unknown caller phoned you, requesting for sensitive information?This known as VOICE PHISHING.
Voice phishing or Vishing is a social engineering method that steals personal confidential information from victims using voice calls.Cyber criminals use savvy social engineering tricks and tactics to convice victims to act,giving up private informations and access to bank accounts.
Vishing Tools Used By Hackers
1. Phone lines, Cellular Phones, burner phones, VoIP (internet phones)
2.Voice Changer App
3.Spoofing Technology: software, service or serve served
4.Pretext : Know whom you are impersonating so well, you are comfortable conversing and answe questions.
5. Flag/Goals: know the information you need to obtain and the questions you can ask to elicit that information.
6.Background Sound App (Call Center,etc).
Reactions
2
2
Faith
Phishing As A Social Engineering Method
Social engineering has several methods such as: Phishing,Spearphishing,Whaling,Smishing,Impersonation,Spoofing,Baiting, Pretexting etc
PHISHING
This is a type of social engineering often used to steal users data including login credentials and credit card number.It usually occurs when an attacker, masquerades as a trusted entity, dupes the user into opening an email containing a malicious URL . This can lead to the installation of malware .Verify every mail sent to you before clicking on any link attached to it.
How To Spot Phising Emails
Generic Greetings: The content of the emails are usually generic and not specific.
Spelling And Grammatical Errors: You will usually notice that some words, url links are misspelled. This is why, you need to cultivate the habit of going through your emails carefully.
They induce extreme emotions
Dangerous file attachments
They contain offers that are to good to be true
Misspelt Domain: E.g, https://nasum.gg.gov instead of https://nasims.gov.ng/login .
Request for sensitive information
Inconsistency in email address,links and domain names.
In Summary, Look Before You Click.
Reactions
2
Faith
Social Engineering Tricks
Social Engineering is the art of psychologically manipulating people into making security mistakes,divulging confidential/sensit information or taking harmful actions.
Social Engineering thrives on human emotions such as; Desire, Fear,Greed,Urgency,Panic,Trust,Excitement and Curiosity.
It is the #1 Cyberthreat faced in Nigeria.
Social Engineering Tricks
1. Gaining trust by providing some familiar information
2.Stirs Fear
3.Presents a problem and provides a solution (Helpfulness)
4.Offering reward
5.Unrealistic threats or consequences
6.Ask you to break protocol
7.Stirs Emotions.
Reactions
1
2
Faith
How To Stay Two Steps Ahead Of “Hacker”
As promised,I will be sharing with you some important tips that will help you stay two steps ahead of Cyber criminals.
Remember, Cybersecurity is not just the responsibility of those in the tech industry alone but it is for everyone in the cyber space
It is a conscious and deliberate effort to keep your cyber space safe.
Have you heard of the "Amygdala Hijack"?
Am sure you're wondering what it is all about 😅
First, Let's start by explaining the term "Amygdala". It is the seat of rational thinking,reasoning,decision making and planing.It is located in the frontal lobe of the brain 🧠. Hijack means to take control unlawfully,seize (an aircraft, ship, or vehicle) in transit and force it to go to a different destination or use it for one's own purposes.
The goal of a hacker is to unlawfully take control of your emotions in other to make you do what he/she wants.Hence you need to stay Alert(it's better to be safe than to be sorry).
Did You Know?
Corporate entities in Nigeria and individuals collectively lost the total sum of $800 million to cyberattacks in 2018 and Social Engineering is the #1 Cyberthreat in Nigeria.
Reactions
2
1
1
Faith
Things You Need To Know About Social Engineering
"Why hack technology when it is easier to hack humans"
Cyber Criminals are always a step ahead. This is why, you need to stay two steps ahead of them. They stir up fear, greed, desire and curiosity to manipulate and deceive their victims into taking an action that unwittingly divulges confidential information. This is known as Social Engineering.
Common methods of social engineering include phishing, vishing, smishing, and impersonation. However, phishing is still the number one method used by cybercriminals to get a foothold into the victims' organization, cause reputational damage, monetary loss, regulatory fines, and many other types of losses, associated with a successful cybercrime.
In my next article, I will be sharing with you some helpful tips that will make you stay two steps ahead of cyber criminals.
Reactions
4
Faith
CyberSecurity is Your Responsibility
Did you know?
95% of Cyber breach are caused by human error!
Few years back , my mum got a call from an unknown caller. He told her, he was calling from her bank. He went on to ask for her middle name and bvn number, stating that they had noticed an error on some of her information and it needed to be fixed.well, she ended up lossing a large sum of money.
Moral Leason
Never ever disclose any of your sensitive information to anyone who calls your claiming they are from your bank.
The Cyber Criminal used "social Engineering" to acquire sensitive information from my mum, which he then used in carrying out his malicious activity.
If only she was more "Cyber aware" Such gross error would not have occur.
Cyber Scurity is the process of keeping your cyber space SAFE. It is a defense mechanism put in place to ensure the safety of your device( phones, laptops as well as other gadgets) and data (information) from cyber criminals.
Cyber security is the responsibility of every person on the cyberspace. It is not just for those in the tech industry.
Key Importance of CyberSecurity
Your data and information can be protected from cybercriminals through cybersecurity. Obtaining your private information, which is supposed to be confidential, is one of an attacker's goals when carrying out attacks, most often impersonation-based ones. The attacker will be unable to access your data, though, if you properly secure your personal information.
With proper cyber security measures, you can detect malicious activity early on and take appropriate action to stop it.
Cyberattacks are occurring at alarmingly high rates around the globe, which is costing both businesses and people significant sums of money as well as damaging their reputations and compromising their ability to protect sensitive information. The losses that might otherwise be sustained are prevented by cybersecurity, which mitigates these attacks.
Reactions
2
2
Faith
5 Myth You Need To Get Rid Off In Other To Stay CyberSafe
Stop🚨
Do you have a minute to spare ?
Lets play a simple game
Raise a finger if you believe that you are too street smart for any online scammer to defraud you or hack your device!😁
Osheey! While you may feel you are too smart to be scammed or hacked,cybercriminals are getting better at tricking people who are not aware of their tactics.This is why, you need to stay "Cyber aware".
Raise a finger if you belive your password is strong 💪 enough to protect you from cybercrimes
Awesome 👏🏽.
Sadly, Having a strong password is often not enough to protect you from cybercrime. You may need to turn on multifactor authentication on all your platforms.
Raise a finger if you use the same password across all your online accounts 🥴
Guilty!😅
I talked about this in my first post. Using the same password across all your online accounts makes it easy for cybercriminals to compromise multiple accounts that belongs to you.
Raise a finger if believe using a free or cracked anti-virus software is enough to protect you.
well, this is as good as fetching water with a basket or leaving your back door open when you go to bed
Raise a finger if you are using your name,birthday and petname as your password
All these information can easily be guessed.In my yesterday's article, I shared two simple techniques you can use when setting your password.
Congratulations if none of your fingers are up.This means that you are Cyber Aware!
If one or more of your fingers are up,then it's time for a change.Cyber security is for everyone not just for those in tech.You need to stay alert .
Reactions
2
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
1
3
2
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below
Cheers!
Reactions
Faith
2 Important Techniques You Should Keep In Mind When Setting Up Your Password
As promised, here are two important techniques you should keep in mind when setting a password across all your platforms.
1. Passphrassing Method:This is a sequence of words or other text used to control access to a computer system,program or data.This means that you can use a short "catch phrase " to form a password .For Example: You can use something like "Ossapa London at Lekki Phase 1= Ossapalodon@lekkiphase1
2.Story Telling Method: In this method, you make a sentence out of something that has you make a sentence out of something that has happened in your life and stringing the first alphabet of each word to form a password. Example: I passed my jamb exams at one sitting scoring a total of 186 =Ipmje@ossato1
Note that this two password used in the examples above contains a mixture of Numbers, symbols,Upercase and Lowercase Letters
The next time you are setting a password,try using any of the techniques above.
Don't forget to leave a comment below!
cheers!
Reactions
Faith
3 Important Things You Need To Do To Avoid Hackers In 2023
"I don't have plenty money, I am not a famous "celeb". I can't get scammed "
How many times have your heared this statement or even used them yourself ?🥴
You feel because, you are not financially boyant or you are not a famous person, you are safe from any form of cyber attacks . Sadly, this is not true.
Millions of people on the internet still fall prey to cyber attacks.
Here are 3 things you can do this year to stay safe on the cyber space:
1. Do not use the same password across all your platforms. I know you think 🤔 using the same password all across your social/financial platforms will help you remember them. Well, while that may work, you are actually exposing yourself to cyberattack. "if some one can guess your password, they will have access to all your information/ data across all platforms and you can also be impersonated (your contact may fall victim).
2. Stop using your birthdays,pet name,lastname,first name,child name,spouse name etc as your password. All these can easily be guessed!. In my next post, I will be sharing with you some techniques to use when choosing a password.
3. Go to www.haveibeenpawned.com and checked if any of your platforms has been attacked recently.
Reactions
3
4
Faith
3 Important Things You Need To Do To Avoid Hackers In 2023
"I don't have plenty money, I am not a famous "celeb". I can't get scammed "
How many times have your heared this statement or even used them yourself ?🥴
You feel because, you are not financially boyant or you are not a famous person, you are safe from any form of cyber attacks . Sadly, this is not true.
Millions of people on the internet still fall prey to cyber attacks.
Here are 3 things you can do this year to stay safe on the cyber space:
1. Do not use the same password across all your platforms. I know you think 🤔 using the same password all across your social/financial platforms will help you remember them. Well, while that may work, you are actually exposing yourself to cyberattack. "if some one can guess your password, they will have access to all your information/ data across all platforms and you can also be impersonated (your contact may fall victim).
2. Stop using your birthdays,pet name,lastname,first name,child name,spouse name etc as your password. All these can easily be guessed!. In my next post, I will be sharing with you some techniques to use when choosing a password.
3. Go to www.haveibeenpawned.com and checked if any of your platforms has been attacked recently.
Reactions
1