customer scoring

6 Common Threats To Wireless Networks

September 17, 2022 Adeniyi Salau 0

   In my previous articles, I have talked about all that you need to know about Home Networks. In this article, I want to look at all that you need to know about Common Threats to Wireless networks. Follow me as we are going to look at that together in […]

How To Use Windows Easy Transfer

How To Use Windows Easy Transfer

September 17, 2022 Adeniyi Salau 0

In my previous article, I have talked about some of the facts that you need to know about computer network security generally. In this article, I want to throw more light on how to fo Window Easy Transfer on Windows Operating System. Follow me as we will look at that […]

10 Types Of Network Security Threats

10 Types Of Network Security Threats

September 17, 2022 Adeniyi Salau 0

When it comes to the process of connecting two or more computers together, there are some risks that are associated with it which you have to be aware of. I want to talk about ten different types of such risks in this article. Follow me as we are going to […]

Understanding Access Control List In Cybersecurity

Understanding Access Control List In Cybersecurity

June 25, 2022 Adeniyi Salau 0

  Many technologies and protocols can have impacts on I’m monitoring. Access Control Lists (ACLs) are among these technologies. ACLs can give a false sense of security if they are overly relied upon. ACLs, and packet filtering in general, are technologies that contribute to an evolving set of network security […]

6 Types Of End Device Logs In Cybersecurity

End Device Logs In Cybersecurity: The Various Types

June 25, 2022 Adeniyi Salau 0

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This software creates logs and stores them on the host. This can make it difficult to get a view of what […]

Network Logs In Cybersecurity: Facts To Note

Network Logs In Cybersecurity: Facts To Note

June 25, 2022 Adeniyi Salau 0

Network Logs In Cybersecurity: Facts To Note   The tcpdump command-line tool is a very popular packet analyzer. It can display packet captures in real-time or write packet captures to a file. It captures detailed packet protocol and content data. Wireshark is a GUI built on tcpdump functionality. The structure […]

Cybersecurity

The Need For Alert Evaluation In Cybersecurity

June 24, 2022 Adeniyi Salau 0

The Need For Alert Evaluation In Cybersecurity   The threat landscape is constantly changing as new vulnerabilities are discovered and new threats evolve. As a user and organizational needs change, so also does the attack surface. Threat actors have learned how to quickly vary the features of their exploits in […]

Using Sguil In Investigating Network Data

Ways Using Sguil In Investigating Network Data

June 24, 2022 Adeniyi Salau 0

  The primary duty of a cybersecurity analyst is the verification of security alerts. Depending on the organization, the tools used to do this will vary. For example, a ticketing system may be used to manage task assignments and documentation. In this article, I am going to talk about ways […]

13 Ways To Avoid Cyber Security Threats

13 Ways To Avoid Cyber Security Threats

August 21, 2021 Adeniyi Salau 0

In my previous article, I have discussed some of the facts that you need to know about phishing and Business Email Compromise generally.   In this article, I want to look at some of the facts that you need to put into consideration in order to avoid cyber security threats. […]

All You Need To Know About Wi-fi Technologies

All You Need To Know About Wi-fi Technologies

February 11, 2021 Adeniyi Salau 0

Wifi is the technology for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices without using cables.   One major problem with Wi-fi is that anyone listening can actually discover what is being communicated. […]

Facts About Endpoint Security Architecture

Facts About Endpoint Security Architecture

February 10, 2021 Adeniyi Salau 0

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other devices connected to a network.   Endpoints need to be secured because they are easy to point of entry into […]

network

14 Steps To Avoid Network Vulnerabilities

February 2, 2021 Adeniyi Salau 0

Here are some of the steps that you need to take to avoid the vulnerabilities of your mobile devices.     #1 Avoid joining Free Wi-fi First and foremost, you should be wary of free wifi, Some of these free wi-fi is set up in order to steal personal data. […]