Tag: cyber attack

  • Is Blockchain a Permanent Fixture in the IT Industry?

    Is Blockchain a Permanent Fixture in the IT Industry?

    By Des Nnochiri   In essence, the nature of business comes down to different companies exchanging value with supplier, partners, and customers. By “value”, we mean goods, services, money, and data. This is the fundamental basis of any business and it has to do this effectively in order to make a profit and survive.   […]

  • Three Cybersecurity Trends for 2019

    Three Cybersecurity Trends for 2019

    By Des Nnochiri   From online banking, insuring cars, and shopping, we are almost totally reliant upon the internet to complete daily tasks and make our lives easier.   However, as technological advancements give us greater convenience, increase productivity, and provide greater access to whole new swathes of entertainment, consumers and businesses alike leave themselves […]

  • Using PowerShell 5 in Windows 7

    Using PowerShell 5 in Windows 7

    By Des Nnochiri   PowerShell has long been a go-to utility for Windows network users, and Windows 7 remains a powerful player in the Microsoft ecosystem. Though the company plans to withdraw support for the operating system in 2020, Windows 7 is still the Windows variant of choice for many users across the globe.   […]

  • Best Security Practices for Enterprise IoT

    Best Security Practices for Enterprise IoT

    By Des Nnochiri   Internet of Things (IoT) security ranks as a major concern for many enterprises. A 2018 survey of over 600 IT decision-makers worldwide conducted by 451 Research found that 55% of those polled rated IoT security as their top priority. It’s easy to see why. As well as any “smart, connected” devices […]

  • Cyber Security in the Movies – Is It Realistic?

    Cyber Security in the Movies – Is It Realistic?

    By Des Nnochiri   Hacking in the movies looks so cool. Someone with a keyboard and five screens frantically types in some code, and a few seconds later: “I’m in.” That’s it– they now have all the information they need to access nuclear missile codes, blackmail a billionaire, or completely shut down a building’s security […]