PostsCommentsPayoutslebey1 (66)in Project HOPE • last yearCybersecurity: Why it is important to have an Asset Register in a FirmAsset management is an important portion of ensuring information security. How do you keep assets that you don't own…lebey1 (66)in Project HOPE • last yearCybersecurity: Clear Desk and Clear Screen PolicyThe clear desk and Clear screen policy are often handled nonchalantly by firms because they fail to understand their…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: Importance of Conducting a VAPT in your OrganisationWith the continuous rise of cybercrimes worldwide, it has become mandatory for firms to employ tools to help harden…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.A younger verison of an old modelDreams are part of what makes us humans. Some of the best innovations in the world started with a dream, and then the…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Personal development: Trust the processThey will always be bad days in one's life but just like the good days; it is not forever. They are days when the…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: How to keep your Mobile phones securedOver 80% of the world's population makes use of mobile phones in today's world. The availability and the outreach have…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cryptocurrency: The shitcoin season is upon usEvery season has its perks, and 2023 has been full of that. Many activities seem to be increasing on the blockchain…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: What differentiates Routers from SwitchesTechnology has come a long way from the way it used to be. This has also impacted the growth of computers, as…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: Firewalls Versus Security guardSecurity guards stationed at office premises are to provide physical security and protect the information, assets and…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.What really mattersThe world as we know it keeps changing from the one we are used to living in 10 years ago, and in truth, the world…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Four things i have learnt from involving myself in Cryptocurrencysource A lot of terms has coined about what cryptocurrency is supposed to be. Everyone has his or her own opinion…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: Getting Documentations right is the first step to ensuring Information securityDocumentation is easy to get right, but it will be funny to know that most organisations struggle to get this right.…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Personal Development: Pratice what you learnWith the amount of knowledge and resources available in the world today, it is very easy to be easily overwhelmed with…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: How Firms Mobile devices and BYOD devices should be handled to ensure Information securityEvery component and part that carries, stores and processes information is important in cybersecurity, regardless of…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: How best to prevent the impact of Insider threat in an organisationHumans are the biggest risk to ensuring the confidentiality, integrity and availability of information assets. While…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.My thoughts on the Hakimi storyYesterday happened to be a very busy day on the internet as the story of what Paris saint germain (PSG) defender…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Key esstential tools to ensure security on the networkCybersecurity is going nowhere soon, and it's important that we prepare for more advanced attacks as technology…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Password ManagementThe most common way hackers breach a system is through the password. Password is usually the first line of defence…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: why an Access Control Audit should be conducted for personal devicessource Cybersecurity involves all assets linked to the internet, so auditing your device on your own will help…lebey1 (66)in Project HOPE • last yearsteemCreated with Sketch.Cybersecurity: Physical measures that bolster organization securityEvery security control has a unique job and purpose. Therefore, doing it correctly will save the organization money…