Skip to content
crmnuggets

CRMNUGGETS

RELIGION. DIGITAL MARKETING. PROJECT MANAGEMENT. ITIL 4 AND MORE

  • Home
  • ABOUT
  • CRM
    • SCRUM
    • ITIL 4
  • STC 30
  • PROJECT MANAGEMENT
  • RCCG SOD
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
  • MORE
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
hacker
    COMPUTER SECURITY CYBER SECURITY

13 Ways To Avoid Cyber Security Threats

  In my previous article, I discussed some of the facts that you need to know about phishing and Business…

Adeniyi SalauJuly 2, 2025July 2, 2025
inbound marketing
    DIGITAL MARKETING

Measuring Inbound Marketing Success: What Really Matters

Adeniyi SalauJune 30, 2025July 9, 2025

Editor Choice Section

MY PICKS
View All
cyber crime 1
    COMPUTER SECURITY CYBER SECURITY

Facts About Business Email Compromise Attack

July 2, 2025July 3, 2025
2
    DIGITAL MARKETING

Tracking Website Traffic and Engagement: Tools and Strategies

July 6, 2025July 7, 2025
cyber security 3
    COMPUTER SECURITY CYBER SECURITY

Details Of The Nigerian Cyber Security Law Now in Force

July 8, 2025July 8, 2025
How A Medical Doctor Got Cured Of Kidney Failure 4
    YOUTUBE VIDEOS

Video: How A Medical Doctor Got Cured Of Kidney Failure

July 11, 2023July 5, 2025
children 5
    COMPUTER SECURITY

6 Negative Impacts Of The Internet On Child Pornography

July 1, 2025July 9, 2025
digital marketing 6
    DIGITAL MARKETING

3 Most Affordable Local Digital Marketing Agencies In Nigeria

June 19, 2025June 27, 2025
Common Vulnerability Scoring System: Facts To Note
CYBER SECURITY

Common Vulnerability Scoring System: Facts To Note

  The Common Vulnerability Scoring System (CVSS) is a risk assessment tool that is designed to convey the common attributes and severity of vulnerabilities in computer hardware and software systems.…

Adeniyi SalauJune 25, 2022October 2, 2023
Risk Management In Cybersecurity: Facts To Note
CYBER SECURITY

Risk Management In Cybersecurity: Facts To Note

Risk management in cybersecurity involves the selection and specification of security controls for an organization. It is part of an ongoing organization-wide information security program that involves the management of…

Adeniyi SalauJune 25, 2022October 2, 2023
Information Security Management System: Facts To Note
CYBER SECURITY

Information Security Management System: Facts To Note

An Information Security Management System (ISMS) consists of a management framework through which an organization identifies, analyzes, and addresses information security risks. ISMSs are not based on servers or security…

Adeniyi SalauJune 25, 2022October 2, 2023
Ways Of Monitoring Syslog And NTP Protocols Effectively
CYBER SECURITY

Ways Of Monitoring Syslog And NTP Protocols Effectively

  Various protocols that commonly appear on networks have features that make them of special interest in security monitoring. For example, Syslog and Network Time Protocol (NTP) are essential to…

Adeniyi SalauJune 25, 2022October 2, 2023
Understanding Access Control List In Cybersecurity
CYBER SECURITY

Understanding Access Control List In Cybersecurity

  Many technologies and protocols can have impacts on security monitoring. Access Control Lists (ACLs) are among these technologies. ACLs can give a false sense of security if they are…

Adeniyi SalauJune 25, 2022October 2, 2023
7 Types Of Security Data In Cybersecurity
COMPUTER SECURITY

7 Types Of Security Data In Cybersecurity

Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a…

Adeniyi SalauJune 25, 2022October 2, 2023
End Device Logs In Cybersecurity: The Various Types
COMPUTER SECURITY

End Device Logs In Cybersecurity: The Various Types

As previously discussed, host-based intrusion detection systems (HIDS) run on individual hosts. HIDS not only detects intrusions but in the form of host-based firewalls, which can also prevent intrusion. This…

Adeniyi SalauJune 25, 2022October 2, 2023
Network Logs In Cybersecurity: Facts To Note
CYBER SECURITY

Network Logs In Cybersecurity: Facts To Note

The tcpdump command-line tool is a very popular packet analyzer. It can display packet captures in real-time or write packet captures to a file. It captures detailed packet protocol and…

Adeniyi SalauJune 25, 2022October 2, 2023
CYBER SECURITY

Use Of Security Onion As A Source Of Alerts

Use Of Security Onion As A Source Of Alerts   Security Onion is an open-source suite of Network Security Monitoring (NSM) tools that run on an Ubuntu Linux distribution. Security…

Adeniyi SalauJune 24, 2022October 2, 2023
The Need For Alert Evaluation In Cybersecurity
CYBER SECURITY

The Need For Alert Evaluation In Cybersecurity

The threat landscape is constantly changing as new vulnerabilities are discovered and new threats evolve. As a user and organizational needs change, so also does the attack surface. Threat actors…

Adeniyi SalauJune 24, 2022October 2, 2023
COMPUTER SECURITY

Elastic Data Core Components In Cybersecurity

  A typical network has a multitude of different logs to keep track of and most of those logs are in different formats. With huge amounts of disparate data, how…

Adeniyi SalauJune 24, 2022October 2, 2023
Using Sguil In Investigating Network Data
CYBER SECURITY

Using Sguil In Investigating Network Data

  The primary duty of a cybersecurity analyst is the verification of security alerts. Depending on the organization, the tools used to do this will vary. For example, a ticketing…

Adeniyi SalauJune 24, 2022October 2, 2023
Digital Forensics In Cybersecurity: Facts To Note
CYBER SECURITY

Digital Forensics In Cybersecurity: Facts To Note

    Now that you have investigated and identified valid alerts, what do you do with the evidence? The cybersecurity analyst will inevitably uncover evidence of criminal activity. In order…

Adeniyi SalauJune 24, 2022October 2, 2023
Cyber Killer Chain In Cybersecurity: Facts To Know
CYBER SECURITY

Cyber Killer Chain In Cybersecurity: Facts To Know

  The Cyber Killer Chain was developed by Lockheed Martin to identify and prevent cyber intrusions. There are seven steps to the Cyber Kill Chain. Focusing on these steps helps…

Adeniyi SalauJune 24, 2022October 2, 2023
Understanding Diamond Model Of Intrusion Analysis
CYBER SECURITY

Understanding Diamond Model Of Intrusion Analysis

  The Diamond Model of Intrusion Analysis is made up of four parts, as shown in the figure. The model represents a security incident or event. In the Diamond Model,…

Adeniyi SalauJune 24, 2022October 2, 2023
How To Establish Incident Response Capability
CYBER SECURITY

How To Establish Incident Response Capability

  Incident Response involves the methods, policies, and procedures that are used by an organization to respond to a cyber attack. The aims of incident response are to limit the…

Adeniyi SalauJune 24, 2022October 2, 2023
8 Expert Tips To Clear CEH Exam In First Attempt
CYBER SECURITY

8 Expert Tips To Clear CEH Exam In First Attempt

  With the Covid 19 pandemic ravaging the country, more and more businesses have had to shift online. While many businesses struggle to get their feet off the ground in…

Adeniyi SalauJune 24, 2022October 2, 2023
The Ultimate Online Privacy Guide for Journalists
CYBER SECURITY

The Ultimate Online Privacy Guide for Journalists

  As a journalist in 2021, the dangers you face are ever-increasing. Without the proper protection from online threats, you risk hackers stealing confidential information, exposing your sources, breaking anonymity,…

Adeniyi SalauJune 24, 2022October 2, 2023
Online Advertising: Facts To Know As A Publisher
DIGITAL MARKETING

Online Advertising: Facts To Know As A Publisher

  In my previous article, I have talked about some of the facts that you need to know about Digital Marketing generally. In this article, I want to talk about…

Adeniyi SalauJune 22, 2022October 2, 2023
Creating A Blogging Strategy for Newbie Bloggers
DIGITAL MARKETING

Creating A Blogging Strategy for Newbie Bloggers

  One of the most important prerequisites for successful blogging is planning. If you approach blogging with a detailed strategy, this will help you guide your actions and activities when…

Adeniyi SalauMay 7, 2022October 2, 2023

Posts pagination

Previous 1 … 81 82 83 … 88 Next

SEARCH THROUGH OUR BLOG

new

NAVIGATE HERE

CHECK THIS

Copyright © 2025 CRMNUGGETS