In my previous articles, I have talked about some of the steps that you can follow in order to secure your devices. In this article, I want to talk about four major actions that can guarantees system security. Follow me as we are going to look at that together in this article.
Here are the steps to take…
#1 System access control
First and foremost, you need to make sure that it is only authorised users that can have access to devices.
The users need to access devices based on what they have or what they do not have. This will reduce unauthorised users.
Also, you need to ensure that authorised users comply with security measures that you have put in place.
An average employee will not always want to comply but you have to make sure that the system is configured in such a way that system will force them to comply with measures that you have put in place.
#2 Data access controls
There is a need for you to keep a close eye on organisational data that are available at your disposal.
You need to understand who is accessing organisational data and for what purpose are they carrying out such activity.
You also need to define access levels based on the roles that every individual are expected to perform. You have to make sure no single individual have access to all aspect of the data.
Nobody should be given access more than what they need to perform their roles.
#3 System and Security Administration
You also have to perform system and security administration such as configuring system settings, implementing security policies as well as monitoring system states among others in order to be sure that intruders cannot have access to organisational resources.
#4 System Design
This has to do with the development of various aspects of system designs for the security architecture.
It covers hardware and software design such as memory segmentation, privilege isolation among other features.
CRMNuggetsis committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
Become Part of our fan base on Facebook. Click Here. Follow Us on Twitter. Click Here. Many Crypto. One place. UseRoqqu
Hi, I now use RavenBank to send, receive, and save money. I also pay my bills with ease, you should try it out too
OUR MISSION
To create well-reached content that will increase the intellectual prowess of our readers.
OUR VISION
To become a reference point in the blogging space by the year 2030. We want to be among the first 30 blogs in Nigeria.
Official Social Media Pages for crmnuggets.com
To Get Email Updates when we post new content,Click Here.
How Blogs Can Complement Websites: A Practical Guide.
As you will find out later on, blogging brings many benefits to a business. One of the main reasons for blogging as a business is to provide more information to your potential customers.
The company website provides information to all of the visitors, but this content is more static and general. Therefore, a blog is a perfect way to complement your website with more information and content that is more dynamic, which means it is regularly updated. A blog also allows you to implement an abundance of keyword-rich materials which is an ideal way to attract relevant search engine queries and position your blog among the top search engine results.
The content that can complement your website include: • How-to articles • Guides • Product details and specification • Product introduction • Product comparison • Demonstration of product features
• Information about the events you are organizing/participating in • Company news and updates
Besides more information about products and product usage, the main distinction a blog can bring to your website is personalization. While website content is more across-the-board, blogging can bring that level of personalization necessary to create a bond with your visitors.
Using the status of an individual as a blog author can help you create content which is more individualized and targeted at specific visitors within your target group.
The bottom line is that blogging is a part of your business and it has a specific role in online marketing. As you will discover later on in this ebook, it is essential that blogging becomes a part of the overall planning, to be incorporated and coordinated with other segments of your business, to ensure the highest performance.
Fact Check Policy
CRMNuggetsis committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
Become Part of our fan base on Facebook. Click Here. Follow Us on Twitter. Click Here. Many Crypto. One place. UseRoqqu
Hi, I now use RavenBank to send, receive, and save money. I also pay my bills with ease, you should try it out too
OUR MISSION
To create well-reached content that will increase the intellectual prowess of our readers.
OUR VISION
To become a reference point in the blogging space by the year 2030. We want to be among the first 30 blogs in Nigeria.
Official Social Media Pages for crmnuggets.com
To Get Email Updates when we post new content,Click Here.
Governments are now actively promoting cybersecurity. For instance, the US Cybersecurity Infrastructure and Security Agency (CISA) is leading efforts to automate the sharing of cybersecurity information with public and private organizations at no cost.
CISA uses a system called Automated Indicator Sharing (AIS). AIS enables the sharing of attack indicators between the US government and the private sector as soon as threats are verified. CISA offers many resources that help to limit the size of the United States attack surface.
The CISA and the National Cyber Security Alliance (NCSA) promote cybersecurity to all users. For example, they have an annual campaign in every October called “National Cybersecurity Awareness Month” (NCASM). This campaign was developed to promote and raise awareness about cybersecurity.
The theme for the NCASM for 2019 was “Own IT. Secure IT. Protect IT.” This campaign encouraged all citizens to be safer and more personally accountable for using security best practices online. The campaign provides material on a wide variety of security topics including:
Social media safety
Updating privacy settings
Awareness of device app security
Keeping software up-to-date
Safe online shopping
Wi-Fi safety
Protecting customer data
The European Union Agency for Cybersecurity (ENISA) delivers advice and solutions for the cybersecurity challenges of the EU member states. ENISA fills a role in Europe that is similar to the role of CISA in the US.
In my previous article. I have tried to look at some of the facts that you need to know about email communication generally. In this article, I want to focus attention on some of the different types of email security threats that you need to know. Follow me as we are going to look at this together in this article.
Here are some of the different types…
#1 Malicious user redirection
In this kind of attack, a mail may contain links that contain websites hosting malware and pornographic materials that may be harmful to the user receiving such links.
#2 Malicious email attachments
These attachments may contain a virus, Trojan, worms, or keyloggers among others. You should note that opening such attachments may infect your computer, That is why you should never click on links that come from an unknown email.
#3 Phishing
In simpler terms. a phishing email or website is a fake website or email looks real but they are actually fake. A phishing email may lure the victim to provide personal information after they might have clicked on those links. You have to be very careful when it comes to opening and clicking on email links. You should always hover over a link before you click on them so as to know where the final destination will be.
#4 Hoax/Chain Email
The user may receive hoax emails that contain false information telling him or her to forward the mail.
#5 Spamming
The user may receive spam emails that may contain malware allowing attackers to take control of the user’s computer.
Action Point PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that because I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained include the staff of Dangote Refinery, FCMB, Zenith Bank, and New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNUGGETS is committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
In my previous article, I talked about some of the facts that you need to understand when it comes to email security for users. In this article, I want to talk about some of the facts that you need to understand when it comes to some of the great cautions for email attachments. Follow me as we are going to look at that together in this article.
Email attachments are one of the major email security threats as they offer attackers some of the easiest and most powerful ways to attack PC.
There are many online consumers that have been told that it is not secure to enter your card online. Because of this vital information, many of us are looking for means of making online purchases without entering our card information or using our card details. In this article, I want to show you some of the means of securing online transactions. Follow me as we are going to be looking at that in this article.
Here are the alternatives…
#1 Store Value Cards
Store Value Cards are plastic cards with a monetary value encoded in the magnetic strip. They are an effective replacement for cash and can be used for lower-value retail purchases.
These cards are not associated with the name of the user, hence they do not reveal any information about the customer. Even if lost, the consumer tends to lose only the value that is still unused.
#2 Smart cards
Smart cards are the same size as credit cards. They have a microprocessor in them, which differentiates them from a credit card, which also has a magnetic strip.
The data on the magnetic stripe can be read, deleted or even changed. Also, a smart card can be used with a smart card reader attached to a personal computer to authenticate a user.
#3 Digital Cash
Digital cash is a method of purchasing cash credit in a small amount. Also, cash credit can be stored on your computer and spent when making electronic purchases on the Internet. The consumer can buy the credits from a financial institution.
Digital cash is associated with a serial number that can be used for online transactions. Please note that sending the serial does not give out your personal information.
#4 E-Wallets
An E-Wallet is a software program used for online transactions. Once the software is installed, personal information can be filled out in the E-Wallet and stored safely. When the user orders something, the order form can be automatically completed using the wallet. This help prevents the theft of personal information. By default, electronic wallet software will always request users to enter a password before completing the form.
When using an online payment service, the user should transfer money to an account associated with the online payment service.
All these purchases and transactions can be carried out through this account. This way, the customer does not reveal credit card information or other personal details to the merchants.
In my previous article, I talked about some of the reasons why many people embrace online payment platforms. In this article, I want to discuss ways of choosing a secured online payment service. Follow me as we are going to look at that together in this article. Here are some of the things you have to look out for when you are making online payments generally.
Make sure that the payment service is legitimate and registered.
Check the reviews of these services at websites such as epinions.com or bizrate.com
Look at the payment service’s website for a seal of approval from TRUSTe, VeriSign, or Better Business Bureau Online (BBBOnline).
Ensure that the website uses encryption technology to help protect your information.
SSL and Padlock Symbol
Secure Socket Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser. The link ensures that all information transmitted between the web server and the browser is secured. The padlock symbol is an indicator that the session is protected by SSL encryption.
What the SSL Shows…
The domain name of the company
Details of the certification company that issued the SSL
One of the ways that your devices can be hacked is when you continue to visit an unsecured website. You need to ensure that you always stay on the side of caution and only visit a healthy website. That is why you need to know some signs that you must see in order to determine whether a site is secured or not. Those are the signs that I want to show you in this article. Let me show you some of the signs in this article.
You have to note some of the following:
A secured site always begins with the prefix https://
The padlock symbol appears either at the bottom right in the browser beside the URL
The certificate used to encrypt the connection also contains information about the identity of the website owner or the organization.
The user can click the lock to view the identity of the website.
Clicking the padlock symbol reveals the website information
Click the View certificate to View the authenticity of the certificate.
Untrusted websites are generally referred to the user through an email sent from someone unknown.
The website presents objectionable content, such as pornography or illegal content.
The website offer schemes that seem too good to be true, indicating a possible scam.
When the user is asked for credit card information without any proof that the transaction has been secured.
In my previous article, I have talked about some of the email security procedures that you have to consider when you need to secure your email from attacks. In this article, I want to delve into some of the practical ways of securing your email accounts, Follow me as we are going to be looking at that together in this article,
Here are some of the steps…
#1 Creating Strong Passwords
I have talked about some of the reasons why you need to create strong passwords in my previous articles. You need strong passwords because they are very difficult to crack or guess. Just like I said in one of my articles that there is no password that cannot be cracked but when you are using a strong password, it will take a while before your account can be hacked.
A strong password can be created by using combinations of numbers (0-9), letters in upper and lower case (a-z, A-Z) and special characters (!@#$%%^). You have to make sure that you create a strong password and make sure that you do not share it or write it anywhere.
#2 Alternate Email Address
An alternate email address is the additional email address required to sign up for most of the free email services such as Gmail and Yahoo as well. This is used by the service provider to identify the email creator’s identity.
An alternate email address is also used for password recovery in case you forgot the password that you used when you created the account.
#3 Remember Me
Most of the popular email clients have the keep me signed in or remember me option. Checking this option will allow the email client to fetch the email inbox of the user without him/her having to fill in the login details again. This might also allow other users on the same device to have access to your email. Users should check that this option is not selected when accessing email addresses from a personal computer.
#4 Using HTTPS
Also, webmails such as Gmail, Yahoo mail, Hotmail, and AOL Mail among others have an option of choosing the communication protocol for browser connection. You need to change thebrowser connection settings to receive email using HTTPS. (HTTP Secured).
#5 Last Account Activity
You need to always check the last email account activity if the feature is available with the email service, Last account activity includes information such as access type (browser, mobile, POP3 among others), location (IP Address), and date/time of account activities. To check account activity in Gmail, scroll to the bottom, scroll to the bottom of the page and then click Details.
#6 Scanning email attachment
You have to be cautious when you are opening any email attachments. You need to save all the email attachments and scan them properly for malware using an anti-virus before opening an email attachment, You need to enable the anti-virus to automatically scan all the emails and downloads.
#7 Turn Off Preview Feature
Also, email clients have the option to show a preview of the email. You need to turn off this feature in the email clients. Turning on this feature may execute script code without you explicitly opening the message. To turn off the preview feature in Microsoft Outlook, Go to:
Go to the View menu and select Reading Page
Click the Off Option.
To Turn Off the preview feature in Mozilla Thunderbird
Go to the View Menuand select Layout
Uncheck the option Message Pane
#8 Email Filtering
Email filtering is the process of organizing emails according to specified criteria. They are generally used to identify and categorize spam emails. Therefore, in order to avoid unwanted email in Microsoft Outlook, go to Delete Group on the Home Tab, click Junk and Junk Email Options, and On the Blocked Sender tab, Click Add. Enter the email address or Domain name and click OK.
#9 Digitally Sign Your Emails
Digital Signatures are used to authenticate the sender of a message or the signer of a document. They can also be used to ensure that the original content of the message is not changed. Also, you need to note that the user requires an email certificate to digitally sign emails. You can always obtain Digital signatures from certification authorities such as Verisign, Comodo, Thwate among others.
A Local Area Network is a network infrastructure that spans a small geographical area. LANs have specific characteristics:
LANs interconnect end devices in a limited area such as a home, school, office building, or campus.
A LAN is usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies.
LANs provide high-speed bandwidth to internal end devices and intermediary devices, as shown in the figure.
The diagram is an illustration of a LAN. At the centre of the diagram is a switch. There are four Ethernet connections on the switch. At the top left is a connection to a PC. Below that is a connection to the computer at the desk of a worker.
Below that is another connection to the computer at the desk of a worker. At the bottom left is a connection to an IP phone. To the right of the switch is a connection to a server. The text under the figure reads: a network serving a home, small building, or a small campus is considered a LAN.
A network serving a home, small building, or a small campus is considered a LAN.
WANs
The figure shows a WAN which interconnects two LANs. A WAN is a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs). WANs have specific characteristics:
WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
WANs are usually administered by multiple service providers.
WANs typically provide slower speed links between LANs.
The figure shows two branch LANs connected via a WAN link. Both LANs are highlighted in a light yellow box and consist of a central switch connected to three PCs, an IP phone, a server, and a router. The two routers are connected via a red WAN link. On the left is the branch 1 LAN and on the right is branch 2 LAN.
Zone-Based Policy Firewall
Zone-based policy firewalls (ZPFs) use the concept of zones to provide additional flexibility. A zone is a group of one or more interfaces that have similar functions or features. Zones help you specify where a Cisco IOS firewall rule or policy should be applied.
In the figure, security policies for LAN 1 and LAN 2 are similar and can be grouped into a zone for firewall configurations. By default, the traffic between interfaces in the same zone is not subject to any policy and passes freely. However, all zone-to-zone traffic is blocked. In order to permit traffic between zones, a policy allowing or inspecting traffic must be configured.
The only exception to this default deny any policy is the router self zone. The self zone is the router itself and includes all the router interface IP addresses. Policy configurations that include the self zone would apply to traffic destined to and sourced from the router. By default, there is no policy for this type of traffic. Traffic that should be considered when designing a policy for the self zone includes management plane and control plane traffic, such as SSH, SNMP, and routing protocols.
Common Security Architectures
Firewall design is primarily about device interfaces permitting or denying traffic based on the source, the destination, and the type of traffic. Some designs are as simple as designating an outside network and inside network, which are determined by two interfaces on a firewall. Here are three common firewall designs.
Private and Public
Demilitarized Zone
Zone-Based Policy Firewalls
As shown in the figure, the public network (or outside network) is untrusted, and the private network (or inside network) is trusted. Typically, a firewall with two interfaces is configured as follows:
Traffic originating from the private network is permitted and inspected as it travels toward the public network. Inspected traffic returning from the public network and associated with traffic that originated from the private network is permitted.
Traffic originating from the public network and travelling to the private network is generally blocked.
The private and public figure shows a cloud within a circle labelled public (untrusted). The cloud connects to a firewall via s 0 / 0 / 0. The g 0 / 0 firewall port connects to a circled labelled VLAN 1 private (trusted) that has a server and two pc’s on it. There is an arrow going from the private circle to the public circle with h t t p, SMTP, and d n s on it. There is another arrow going from the public circle to the private circle with the words no access.
To Get Email Updates when we post new contents, Click Here.
The campus wired LAN uses a hierarchical design model to separate the network topology into modular groups or layers. Separating the design into layers allows each layer to implement specific functions, which simplifies the network design. This also simplifies the deployment and management of the network.
The campus wired LAN enables communications between devices in a building or group of buildings, as well as interconnection to the WAN and Internet edge at the network core. A hierarchical LAN design includes the access, distribution, and core layers as shown in the figure.
The figure shows two internet clouds at the top. Each cloud connects to two routers, one on the left and one on the right. Below the routers are two layers 3 switches within a box labelled core layer. Each router connects to each of the switches.
The switches also have multiple lines between them with a circle around the lines. Below these two switches are two more switches within a box labelled distribution layer. Each of the top switches connects to each of the two switches below them.
Below the distribution layer switches are three-layer 2 switches and two access points within a box labelled access layer. Each access layer switch has a connection to each of the distribution layer switches. Each access point connects to just one of the access layer switches.
Below the access, layer box are two wireless tablets. Each wireless tablet connects wirelessly to a wireless a p. Also below the access layer box are four IP phones. Each phone has a p c attached. One phone connects to the left access layer switch, two phones connect to the middle access layer switch, and the last phone connects to the last access layer switch.
Hierarchical Design Model
Each layer is designed to meet specific functions. The access layer provides endpoints and users direct access to the network. The distribution layer aggregates access layers and provides connectivity to services. Finally, the core layer provides connectivity between distribution layers for large LAN environments.
User traffic is initiated at the access layer and passes through the other layers if the functionality of those layers is required.
Even though the hierarchical model has three layers, some smaller enterprise networks may implement a two-tier hierarchical design. In a two-tier hierarchical design, the core and distribution layers are collapsed into one layer, reducing cost and complexity.
The figure shows two internet clouds at the top. Each cloud connects to two routers, one on the left and one on the right. Below the routers are two layer 3 switches within a box labeled collapsed core. Each router connects to each of the switches. Below the collapsed core box are three layer 2 switches and two access points.
Each switch has a connection to each of the switches within the collapsed core box. Each access point connects to just one of the access layer switches. Below the collapsed core box are two wireless tablets. Each wireless tablet connects wirelessly to a wireless a p. Also below the collapsed core box are four IP phones.
Each phone has a p c attached. One phone connects to the left access layer switch, two phones connect to the middle access layer switch, and the last phone connects to the last access layer switch.
In flat or meshed network architectures, changes tend to affect a large number of systems. Hierarchical design helps constrain operational changes to a subset of the network, which makes it easy to manage as well as improve resiliency. Modular structuring of the network into small, easy-to-understand elements also facilitates resiliency through improved fault isolation.
Firewalls
Typically, a firewall with two interfaces is configured as follows:
Traffic originating from the private network is permitted and inspected as it travels toward the public network. Inspected traffic returning from the public network and associated with traffic that originated from the private network is permitted.
A demilitarized zone (DMZ) is a firewall design where there is typically one inside interface connected to the private network, one outside interface connected to the public network, and one DMZ interface, as shown in the figure.
Traffic originating from the private network is inspected as it travels toward the public or DMZ network. This traffic is permitted with little or no restriction. Inspected traffic returning from the DMZ or public network to the private network is permitted.
Traffic originating from the DMZ network and traveling to the private network is usually blocked.
Traffic originating from the DMZ network and traveling to the public network is selectively permitted based on service requirements.
Traffic originating from the public network and traveling toward the DMZ is selectively permitted and inspected. This type of traffic is typically email, DNS, HTTP, or HTTPS traffic. Return traffic from the DMZ to the public network is dynamically permitted.
Traffic originating from the public network and traveling to the private network is blocked.
To Get Email Updates when we post new contents, Click Here.
Windows 8, along with its new Start screen, also provides new ways to change display settings. In addition, those with tablets or touchscreens can take advantage of swiping features from the corners and edges of a tablet or laptop screen. In this project, you will look at the Windows 8-based methods of changing the screen resolution, changing display settings, and controlling what happens when one swipes in from (or hovers the mouse over) a corner or edge of the screen. Steps for Completion: 1. The first task is to change the screen resolution. On a Windows 8.1 device, access the Charms bar on the right side of the screen. 2. Click Settings. 3. Click Change PC Settings. You will see a screen similar to this:
4. Click PC and devices. 5. In the PC and devices menu on the left side, click Display. You will see something similar to the image on the right: 6. Click in the bar below the Resolution setting and drag the slider to a different resolution. 7. Click Apply. A screen will appear asking if you want to keep the changes or revert the screen resolution to the previous setting. 8. Click either the Keep Changes button or the Revert button. The screen resolution will either save the new setting (if you click Keep Changes) or return to the previous setting (if you click Revert). 9. In the PC Settings section on the left side of the screen, click Lock screen. Note that you may have to scroll down the screen to see all of the available lock screen settings.
10. Here, you can choose apps for which you want to show notifications on a locked screen, choose an app to show alarms, and choose whether to use the camera on the device when the device is locked.
11. Click on one of the smaller pictures to change the lock screen background.
12. If you have a camera setting at the bottom of the screen, click the Off switch to change the setting to On and turn on camera use when the lock screen is swiped down.
13. Hover your mouse over the lower-left corner of the screen. When the Start button appears, click it. If you see the desktop, click the Start button again to show the Start screen.
14. On the Start screen, click your account name in the top-right corner of the screen and then click Lock. Your new lock screen will appear. 15. Click the screen. The logon screen will appear.
16. Enter your password and press Enter to unlock your device. 17. To control how the mouse interacts with the corners and edges of the screen, hover your mouse over the top-left corner of the screen. A small picture of the PC Settings will appear. Click the picture. The PC Settings screen will appear.
18. In the PC and devices menu, click Corners and edges. 19. By default, the left side of the screen can be used, through hovering the mouse over it (or through swiping on the tablet), to switch between apps.
20. Also, by default, the Charms bar will show when the mouse moves to the upper-right corner of the screen.
21. By default, Windows Store apps do not show on the taskbar. Click the Off switch to turn the feature on (or, if it is on, to turn it off). Turning this on will show the icon for PC Settings and any other open Store apps on the taskbar, and turning it off will hide open Store apps (including PC Settings) from the taskbar.
22. Click the left arrow next to the words PC and devices to return to the PC Settings screen.
23. Hover your mouse over the lower-left corner of the screen to display the Start button.
24. Click the Start button.
Windows 8, along with its new Start screen, also provides new ways to change display settings. In addition, those with tablets or touchscreens can take advantage of swiping features from the corners and edges of a tablet or laptop screen. In this project, you will look at the Windows 8-based methods of changing the screen resolution, changing display settings, and controlling what happens when one swipes in from (or hovers the mouse over) a corner or edge of the screen. Steps for Completion: 1. The first task is to change the screen resolution. On a Windows 8.1 device, access the Charms bar on the right side of the screen. 2. Click Settings. 3. Click Change PC Settings. You will see a screen similar to this:
4. Click PC and devices. 5. In the PC and devices menu on the left side, click Display. You will see something similar to the image on the right: 6. Click in the bar below the Resolution setting and drag the slider to a different resolution. 7. Click Apply. A screen will appear asking if you want to keep the changes or revert the screen resolution to the previous setting. 8. Click either the Keep Changes button or the Revert button. The screen resolution will either save the new setting (if you click Keep Changes) or return to the previous setting (if you click Revert). 9. In the PC Settings section on the left side of the screen, click Lock screen. Note that you may have to scroll down the screen to see all of the available lock screen settings.
There are two types of accounts that can be added to a device running Windows 8.1: a Microsoft account and a local account. In this project, you will add both types of accounts to a device.
Steps for Completion:
1. On a device running Windows 8.1, hover your mouse to the top-right corner of the screen. The Charms bar will appear.
2. Click the Settings button.
3. Click Change PC Settings.
4. Click Accounts. You will see your account information on the screen.
5. On the left side of the screen, click Other.
accounts 6. Click . You will see a screen similar to the screen on the right:
7. Click in the Email address text box and type an email address that belongs to a registered Microsoft account.
8. Click the Next button.
9. Click the Finish button. You should be returned to the Manage other accounts screen. 10. To add a local account to the device, click Add an account.
11. At the bottom of the How will this person sign in screen, click the Sign in without a Microsoft account (not recommended) link .
12. Click the Local account button.
Required Materials: Windows 8.1 with administrative privileges so that accounts can be created and a Microsoft account Objectives:
1.0 Understanding Device Configurations 1.2 Configure Desktop Settings 1.2.b Configure Profiles 13. Fill out all four fields on the screen. 14. Click the Next button. 15. Click the Finish button. Your Manage other accounts screen should have a Microsoft account and a local account as seen on the right: 16. Close the PC Settings screen.
Points to Remember:
• The starting point for adding both Microsoft and local accounts is in PC Settings.
Action PointPS:I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNuggetsis committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
Description: One of the major adjustments from moving to Windows 7 to Windows 8 was the disappearance of the Start button from the desktop.
In Windows 8.1, the Start button is back on the desktop but does not display the Start menu. Rather, it displays the Start screen. In addition, the first screen that shows after logging on to Windows 7 is the desktop. In Windows 8, the first screen is the Start screen.
Many users would rather see the desktop displayed upon logging into a machine and not the Start screen. This project will take you through making that change. This project will also walk you through adding the Start menu to the Windows taskbar so you can get to the Start menu at any time.
Steps for Completion:
1. Log on to a Windows 8.1 device and navigate to the Desktop. 2. To change Windows 8.1 to show the desktop instead of the Start screen when logging on to a device, right-click the taskbar at the bottom of the screen and click Properties. The Taskbar and Navigation properties will appear. 3. Click the Navigation tab. 4. In the Start screen area, select the When I sign in or close all apps on a screen, go to the desktop instead of Start check box. 5. Click the OK button. 6. Log off from the device. 7. Log on to the device. You should now see your desktop instead of the Start screen.
8. To start the process of displaying a link from the Start menu, open File Explorer. 9. In File Explorer, click the View tab on the ribbon. 10. In the Show/hide group, select the Hidden items check box. 11. Close File Explorer. 12. Right-click the taskbar, click Toolbars, and then click New toolbar. 13. Navigate to the C: drive. 14. Double-click the ProgramData folder. 15. Double-click Microsoft. 16. Double-click Windows. 17. Click the Start Menu folder. 18. Click the Select Folder button. 19. Click the arrows on the right side of the Start Menu text and a start menu will appear, starting with a Programs folder. 20. Hover your mouse on the Programs folder. 21. Click anywhere on the desktop to hide the Start menu. 22. To remove the Start menu from the taskbar, right-click the taskbar, click Toolbars, and then click the check mark next to Start menu. This will remove the Start menu from the taskbar. Points to Remember: • In Windows 8, you can control what a user sees when logging on to a device (Start screen or desktop). • Toolbars can be added to a taskbar. For adding the Start Menu folder, hidden folders need to be set to display.
Action PointPS:I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNuggetsis committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
When a device is first configured, it actually belongs to a network called a workgroup. A workgroup is a peer-to-peer network in which devices can communicate and share information with each other. Most home-based users of Windows devices will never even realizethey are on a workgroup. In this article, I will talk about joining device to a network.
A more organized type of peer-to-peer network is a HomeGroup. A single device on the network will start the HomeGroup. The initiating device, by default, will share pictures, music, video, and printers, but not documents. A device joining a HomeGroup does not share any of its folders by default.
A device running Windows 8.1 Pro or Windows 8.1 Enterprise can join a domain. A domain, typically found in a business network, is a client/server network. In a client/server network, one or more central servers control the user names, passwords, file sharing, permissions, and other network management aspects, such as policies and settings.
In the next exercise, you will join a device to a domain. Note that in order for a device to join a domain, network discovery must be turned on.
Steps for Completion:
1. On your device, click the Start button. The Start screen will appear.
2. Right-click the PC icon and click Properties. 3. In the Computer name, domain, and workgroup settings area, click Change settings. 4. Click the Change button. The Computer Name/Domain Changes dialog box will appear. 5. Select the Domain option. 6. In the Domain text box, type the name of the domain you are joining. 7. Click the OK button.
8. Enter a user name and password of an account that has administrative permissions on the network. 9. Click the OK button. If the user name and password is correctly entered, you will see a message similar to the image on the right: 10. Click the OK button twice. 11. Click the Close button. 12. Restart your device. 13. Upon restart, you will be able to log on to your domain, using your user name and password for the domain.
Points to Remember: • Windows 8.1 (Basic) and Windows RT devices cannot join domains. • Know that by default, a device initiating a HomeGroup does not share out documents. • Know that by default, a device joining an existing HomeGroup does not share out its own folders.
Action PointPS:I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNuggetsis committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
In this exercise, you will review some of the different ways in which you can access the Control Panel. You will also look through the different Control Panel views, and, you will search for an item in the Control Panel.
NOTE: Here is a reminder for this and any other exercise involving using Windows 8.1:
If you are using a device such as a Surface Pro 3, substitute a click instruction for a tap instruction and substitute a right-click instruction for a tap and hold instruction. Steps for Completion:
1. There are several ways to open the Control Panel. Choose one of the following:
a. On a Windows 8.1 device (or computer), click the File Explorer icon on the Windows Taskbar. In the address bar, near the top of the screen, click the arrow to the left of This PC. From the list of available options, click Control Panel. b. Click the Start button in the lower-left corner of the screen. Click the down arrow at the bottom of the screen to display the Apps screen. Scroll to the right of the Apps screen until you see the Windows System group. Click the Control Panel icon.
c. With your desktop showing, hover your mouse over the top-right corner of the screen. The Charms bar will appear. Click the Settings button. Click Control Panel.
2. To look at some different Control Panel views, click the drop-down arrow next to Category and click Large Icons. The Control Panel should now look like the screen below:
3. To see the applets as small icons, click the drop-down arrow next to Large Icons and choose Small Icons. The Control Panel will now display groups as small icons. 4. To search for a Control Panel item. Click in the Search Control Panel text box and type: hibernate. 5. Click the x in the Search Control Panel field to restore the Control Panel to its home page. 6. Close the Control Panel.
Points to Remember:
• There are several ways to access the Control Panel. Practice the different methods available. • The Control Panel has three views: Category, Small Icons, and Large Icons. • The easiest way to look for a specific Control Panel item is to search for it.
Action PointPS:I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNuggetsis committed to fact-checking in a fair, transparent, and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
In order to best utilize features on any Windows device (such as a Surface, Windows Phone, or Xbox), you will need to have a Microsoft account. This account, which used to be known as a Windows Live ID, just needs to be a legitimate email address.
A Microsoft account will enable you to:
• Utilize OneDrive, a cloud-based storage option, to store your files and then access those files from any Windows, iOS, or Android device. • Synchronize some or all of your files and settings across Windows devices, laptops, and desktops. • Access your games and other media through Xbox Live. • Download apps from the (Windows) Store. In this exercise, you will obtain a Microsoft account. If you already have a Microsoft account, you do not need to do this project. If you have an account you use to sign into OneDrive, Xbox, or the (Windows) Store, you have a Microsoft account.
Steps for Completion:
1. Open a web browser (like Internet Explorer) and navigate to www.microsoft.com. 2. Click the Sign in link near the top-right corner of the page. 3. On the sign-in page, click Sign up Now. You will see the following, with information to fill out after this information: 4. Fill out the information and then click the Create Account button at the bottom of the screen. At this point, you will have a Microsoft account.
Points to Remember:
• A Microsoft account is necessary to take full advantage of features in Windows 8, 8.1, and for Windows devices. • A Microsoft account can also be used to synchronize data through Microsoft apps onto non-Microsoft devices, such as an iPhone, iPad, or any Android device.
Action Point PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNUGGETS is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
End devices are especially prone to malware attacks. Therefore, the focus of this topic is on threats to end devices. Malware is short for malicious software or malicious code. It is code or software that is specifically designed to damage, disrupt, steal, or generally inflict some other “bad” or illegitimate action on data, hosts, or networks.
It is important to know about malware because threat actors and online criminals frequently try to trick users into installing malware to help exploit security gaps. In addition, malware morphs so rapidly that malware-related security incidents are extremely common because antimalware software cannot be updated quickly enough to stop the new threats.
A text box opens that reads “A virus is a malicious software which executes a specific unwanted, and often harmful, function on a computer”. As the animation continues to play the attacker at the PC on the left sends a worm attack on the network that travels over the network routers to the PC on the right.
A text box opens that reads “A worm executes arbitrary code and installs copies of itself in the memory of the infected computer. The main purpose of a worm is to automatically replicate itself and spread across the network from system to system”.
As the animation continues to play the attacker at the PC on the left sends a Trojan Horse attack on the network that travels over the network routers to the PC on the right. A text box opens that reads “A Trojan horse is a non-self-replicating type of malware.
It often contains malicious code that is designed to look like something else, such as a legitimate application or file. When an infected application or file is downloaded and opened, the Trojan horse can attack the end device from within”.
The primary vulnerabilities for end-user workstations are virus, worm, and Trojan Horse attacks.
A virus is malicious software which executes a specific unwanted, and often harmful, function on a computer.
A worm executes arbitrary code and installs copies of itself in the memory of the infected computer. The main purpose of a worm is to automatically replicate itself and spread across the network from system to system.
A Trojan horse is a non-self-replicating type of malware. It often contains malicious code that is designed to look like something else, such as a legitimate application or file. When an infected application or file is downloaded and opened, the Trojan horse can attack the end device from within.
Viruses
A virus is a type of malware that spreads by inserting a copy of itself into another program. After the program is run, viruses then spread from one computer to another, infecting the computers. Most viruses require human help to spread. For example, when someone connects an infected USB drive to their PC, the virus will enter the PC.
The virus may then infect a new USB drive, and spread to new PCs. Viruses can lay dormant for an extended period and then activate at a specific time and date. A simple virus may install itself at the first line of code in an executable file. When activated, the virus might check the disk for other executables so that it can infect all the files it has not yet infected.
Viruses can be harmless, such as those that display a picture on the screen, or they can be destructive, such as those that modify or delete files on the hard drive. Viruses can also be programmed to mutate to avoid detection.
Most viruses are now spread by USB memory drives, CDs, DVDs, network shares, and email. Email viruses are a common type of virus.
Trojan Horses
The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors.
At night, after most Trojans were asleep, the warriors burst out of the horse, opened the city gates, and allowed a sizeable force to enter and take over the city. Trojan horse malware is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it. Often, Trojans are found attached to online games.
Users are commonly tricked into loading and executing the Trojan horse on their systems. While playing the game, the user will not notice a problem. In the background, the Trojan horse has been installed on the user’s system. The malicious code from the Trojan horse continues operating even after the game has been closed.
The Trojan horse concept is flexible. It can cause immediate damage, provide remote access to the system, or access through a back door. It can also perform actions as instructed remotely, such as “send me the password file once per week.” This tendency of malware to send data back to the cybercriminal highlights the need to monitor outbound traffic for attack indicators.
Custom-written Trojan horses, such as those with a specific target, are difficult to detect.
Trojan horses are usually classified according to the damage that they cause, or the manner in which they breach a system, as shown in the figure.
Worms
Computer worms are similar to viruses because they replicate and can cause the same type of damage. Specifically, worms replicate themselves by independently exploiting vulnerabilities in networks. Worms can slow down networks as they spread from system to system.
Whereas a virus requires a host program to run, worms can run by themselves. Other than the initial infection, they no longer require user participation. After a host is infected, the worm is able to spread very quickly over the network.
Worms are responsible for some of the most devastating attacks on the internet. In 2001, the Code Red worm had initially infected 658 servers. Within 19 hours, the worm had infected over 300,000 servers.
The initial infection of the SQL Slammer worm is known as the worm that ate the internet. SQL Slammer was a denial of service (DoS) attack that exploited a buffer overflow bug in Microsoft’s SQL Server. At its peak, the number of infected servers doubled in size every 8.5 seconds.
This is why it was able to infect 250,000+ hosts within 30 minutes. When it was released on the weekend of January 25, 2003, it disrupted the internet, financial institutions, ATM cash machines, and more.
Ironically, a patch for this vulnerability had been released 6 months earlier. The infected servers did not have the updated patch applied. This was a wake-up call for many organizations to implement a security policy requiring that updates and patches be applied in a timely fashion.
Other Malware
These are some examples of the varieties of modern malware:
Type of Malware
Description
Spyware
Used to gather information about a user and send the information to another entity without the user’s consent. Spyware can be a system monitor, Trojan horse, Adware, tracking cookies, and key loggers.
Adware
Displays annoying pop-ups to generate revenue for its author. The malware may analyze user interests by tracking the websites visited. It can then send pop-up advertising pertinent to those sites.
Scareware
Includes scam software which uses social engineering to shock or induce anxiety by creating the perception of a threat. It is generally directed at an unsuspecting user and attempts to persuade the user to infect a computer by taking action to address the bogus threat.
Phishing
Attempts to convince people to divulge sensitive information. Examples include receiving an email from their bank asking users to divulge their account and PIN numbers.
Rootkits
Installed on a compromised system. After it is installed, it continues to hide its intrusion and provide privileged access to the threat actor.
This list will continue to grow as the internet evolves. New malware will always be developed. A major goal of cybersecurity operations is to learn about new malware and how to promptly mitigate it.
Common Malware Behaviors
Cybercriminals continually modify malware code to change how it spreads and infects computers. However, most produce similar symptoms that can be detected through network and device log monitoring. Computers infected with malware often exhibit one or more of the following symptoms:
The appearance of strange files, programs, or desktop icons
Antivirus and firewall programs are turning off or reconfiguring settings
A computer screen is freezing or the system is crashing
Emails are spontaneously being sent without your knowledge to your contact list
Files have been modified or deleted
Increased CPU and/or memory usage
Problems connecting to networks
Slow computer or web browser speeds
Unknown processes or services running
Unknown TCP or UDP ports open
Connections are made to hosts on the Internet without user action
Strange computer behaviour
Note: Malware behaviour is not limited to the above list.
Action Point
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Action Point PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that because I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained include the staff of Dangote Refinery, FCMB, Zenith Bank, and New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNUGGETS is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
There is a need for vendors to have a catalogue of known viruses so that they can profile them and share their knowledge with others. The Threat Intelligence Department always take samples of each known viruses, In this article, I willl be talking about Threat Intelligence in Network Security.
They look at the signature to see if it matches a virus file. The viruses when they are discovered are added to the known virus list. They are added to the known viruses list. The updates are done regularly and in a variety of ways. In this article, I want to talk about the Threat Intelligence Service in Network Security.
The updates are done monthly, quarterly or once a year. As malware developers gain expertise, the malware becomes more sophisticated. They now include a mechanism that allows them to bypass the signature list for viruses.
The malware now has the ability to change file contents so that they will not be detected. This allows the malware to avoid the antivirus family. This allows a single malware to change characteristics and have attributes of multiple malware.
Malware Proliferation
Those types of malware are known as polymorphic malware. There was also the development of Malware as a Service which has cybercrime as their major focus.
Because malware is developed in a hundred of thousands on a daily basis, the idea of using signature and footprint based detection cannot scale through. Because signature-based malware detection cannot work, there was the introduction of Sandbox products.
This now takes a suspected file and placed it in an environment where its behaviours can be closely studied. If the file does something malicious while in the sandbox, it is flagged as malware. This is also known as heuristic detection. This is also used by vendors to discover different Samples of Polymorphic malware.
With the development of Sandbox, new malware is discovered. And the knowledge gained and the discovery can now be shared with other Network Security Professionals. These details can also be sent to the Vendor Threat Intelligence Service.
This can now be shared with more vendors so that more people can be protected. The future of detecting previously unknown malware includes Threat Intelligence Services. This makes use of Artificial Intelligence and Machine Learning.
The Threat Intelligence Service also keep knowledge about files, existing threats and emerging attacks on the network. It also keeps a record of the specific mechanism of the attack.
It also keeps records of the evidence that the attack has happened also known as Indicators Of Compromise. It also keeps records of implications as well as the attributes of the attacks as well as the potential motivation for such attacks.
The techniques used by bad actors continue to evolve and become more sophisticated. This is why it is now more important to share threat intelligence in real time across the entire network security environment.
If the information is shared in real time, it will allow the entire network security community to guard against such attacks. Security services and threat intelligence services that can act together in real time stands the best chance of stopping attacks from bad actors.
There is a sharing of security threat intelligence among almost all vendors. This happens through formal membership of both national and international organisations and alliances such as Cyber Threat Alliance, National and International Computer Emergency Response Team as well as numerous partnerships between different vendors.
This idea of sharing allows for collaboration among vendors because no single vendor has all the data. Fortinet has Fortiguard Lab.
They have team members across about 10 security disciplines. They are always seeking new avenues of attack every day. This allows them to discover and guard against emerging threats. They provide comprehensive security services against emerging threats. This covers the full range of Fortinet Security solutions.
Action Point PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.
SOAR stands for Security Orchestration, Automation, and Response. The term is used to describe three software capabilities – threat and vulnerability management, security incident response and security operations automation. SOAR allows companies to collect threat-related data from a range of sources and automate responses to low-level threats.
What is SOAR
SOAR connects all your security tools together into a defined workforce that can be run automatically. It increases the efficiency of your team members by automating repetitive processes.
Automation is very important in today’s security world because the security team are overwhelmed. As new tools are developed to address security challenges, network security experts have to switch between those tools to analyse those tools.
One of the common day-to-day tasks is responding to alerts. With more security tools come more alerts. When you have more alerts to respond to that means you have lesser time to spend on each alert. This will increase the likelihood of mistakes being made. When you have more alerts to respond to and it is degrading your performance. It is always referred to as Alert Fatigue.
Alert Fatigue
You should note that even if you want to hire more security analysts, they are in short supply. When SOAR put all the alerts in one place, it reduces the number of Alerts that Analysts have to deal with. This allows Analyst to perform all their analysis from the source interface of the device. This process can now be manually or automatically transformed into a playbook.
A playbook is like a flowchart of steps that can be repeated on demand. By using a playbook, you can ensure that standard operating procedures are followed and there are no errors. You can also monitor the activities that are performed. When it was performed and who was the person that carried out such activity? This is called orchestration and automation in network security.
Investigation
An investigation is another crucial capability of SOAR. When suspicious activity is discovered, teams can perform their investigative tasks. When carrying out an investigation, they can check threat sources to know where it is coming from and whether it has happened before.
They can also query a security information manifest system to know more about the threats. They can also check the Security Information and event management system to profile the threats and decide on the best ways of dealing with those threats.
The information gathered from the investigation will now determine the required mitigation steps to follow. Because SOAR covers all your security tools, you can take those mitigation steps from within SOAR and apply them to your entire network security structure.
From within SOAR, you can block traffic from a malicious IP address. You can also delete a phishing email from your server. You can also make use of playbooks to automate repetitive tasks from within SOAR.
Automation
The automation process allows Analysts to devote more time to investigating threats and taking mitigation steps. SOAR does more than centralise the incident response process. It optimizes the entire network security operations for the organization. An optimisation can help in improving security employee performance and boosting collaboration.
SOAR also allows you to assign different categories of alerts to different types of individuals that can handle such alerts. It also allows them to add additional information to those alerts as they work on them. This will allow those that will work on that later to have an additional context of the information.
More About Playbooks
A team uses a playbook also known as Workflow as a way of determining how to respond to alert workflows. The playbook can emulate and take the steps that Analysts would have taken when they are responding to security incidence. Playbook does repetitive tasks such as compiling databases or sending emails. It can also implement firewall blocks.
It allows teams to improve their response speed and consistency. It also allows teams to maintain authority over the entire process. Using a playbook can reduce the Analyst workload. It is capable of reducing the chance of error.SOAR can be used to carry out our Phishing investigation. With SOAR, an analyst will spend so much time tracing the sender of a phishing email.
Phishing Investigation
If the Analyst determines where Phishing is coming from, they will need to spend more time investigating the Phishing server.
They need to determine who received or click on the email as well as delete them. With a Phishing investigation playbook, the initial steps in phishing investigation are taken automatically. As the emails come in, the Analyst will only be alerted to those emails that the playbook considers suspicious.
After the Analyst confirms that the email is truly a phishing email, the playbook can continue to take further actions on the email. It can now automatically delete the email from all users’ inboxes. It will now alert the Analyst about the actions taken. It can also take decisions on what to do when similar phishing messages are received in the future. The Fortinet SOAR product is called FortiSOAR and it has all the features that we have mentioned so far.
Action Point PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that because I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained include the staff of Dangote Refinery, FCMB, Zenith Bank, and New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.
I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.
Fact Check Policy
CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.