10 THINGS TO KNOW ABOUT NIGERIA’S CYBERCRIME ACT 2015 This is a high-level overview of what the Cybercrime Act 2015 provides, and things we should be aware of. Gives the President the power to designate certain computer systems, networks and information infrastructure vital to the national security of Nigeria or the economic and social well-being of its citizens, as constitutingCritical National Information Infrastructure, and to implement procedures, guidelines, and conduct audits in furtherance
Your Kids Vs Technology – How TheOneSpy could have prevented it. There is nothing more upsetting to parents than to see their kids in turmoil or distress. However, regardless of putting maximum efforts in protecting kids, there is only so much a parent can actually do. Occasionally, the issue becomes obsessively great and there is not much that can be done. But why should one let it get that far?
Microsoft Nigeria recently in a meeting in Lagos, Nigeria says Small and Medium Enterprises must leverage technology to survive the current economic challenges facing Nigeria. Mr Christopher Ahonsi, Customer Immersion Experience Lead, Microsoft Nigeria, spoke on the sidelines of the Annual SME Forum 2016 organised by BusinessDay Media Ltd in Lagos that technology will help SMEs to cut cost of running their business, while still maintaining the quality and efficiency of
US Office of the Director of National Intelligence releases unclassified version of intel community’s findings on Russia’s attempts to influence US presidential race via cyberattacks, leaks, and pure propaganda. Russian president Vladimir Putin “ordered” a wide-ranging effort to disrupt and influence the outcome of the 2016 US presidential campaign in favor of President-Elect Donald Trump, according to an unclassified report published today by the US Office of the Director of
Hackers are a major pain in the side of industry and private consumers. While that may be true, the term “cyberattack” is used increasingly loosely in the same way that getting “hacked” also appears to apply to leaving your Facebook account logged in. Real cyberattacks consist of a concerted effort to breach a target’s defenses. They occur almost daily, mostly aimed at businesses with private information to steal, such as