Author name: Wuraola Taiwo

Data breaches: A Persistent Concern

Data breaches have far-reaching negative effects on organizations, including but not limited to financial loss,  reputational damage and loss of trust with clients, customers and employees. In Nigeria, organizations may face significant penalties under laws like the Nigeria Data Protection  (NDPA), which imposes fines of up to ₦10 million or 2% of annual gross revenue, depending on the severity of the breach and the size of the organization. Another damaging effect of data breach is the disruptive effect of operational downtime, legal implications and lastly, the impact of sensitive data loss. 

Data breaches: A Persistent Concern Read More »

Google’s Linguistic Diversity: Inclusion for Africa

The next decade is predicted to be Sub-Saharan Africa’s digital decade, whereby half of the population will gain access to the internet, thereby unlocking opportunities for growth and development.  Google’s financial commitment is a step in the right direction to enhance connectivity, drive innovation and support local entrepreneurs across the continent.  

Google’s Linguistic Diversity: Inclusion for Africa Read More »

Cybersecurity threats: understanding Watering Hole Attacks

Different individual attackers and groups are responsible for watering hole attack. Governments, criminal organizations, and activist groups are perpetrators of this attack. They do this for financial gain, political or ideological motivation, intellectual property theft, personal gain, disruption of operations, Surveillance and so on.

Cybersecurity threats: understanding Watering Hole Attacks Read More »

A Short Guide to Spotting and Reporting Phishing Scams

Phishing is a type of scam where attackers send fake emails or set up fake websites to trick people into sharing personal information, such as passwords or bank details. These emails often contain links or attachments that can infect your device with malware or lead you to a fake site designed to steal your information.

A Short Guide to Spotting and Reporting Phishing Scams Read More »

Scroll to Top