Safety in the Workplace

  The key to a safe workplace is having effective safety and security policies in place and to communicate these policies to all employees. For Example: Require office visitors to be escorted or to wear identification. Require delivery people to wait in the reception area and to make deliveries at that one location only. • Establish an emergency alert procedure for the receptionist to signal … Continue reading Safety in the Workplace

Hack Windows Password in 2 Minutes

At least, that’s how long it would take a hacker worth his salt to hack into any Microsoft Windows account – 2 minutes! Very worrisome, isn’t it? Goes to show that anyone that thinks his data is safe just because it is tucked away in his “passworded” Windows account would really need to have a rethink. I will not go through the process of how … Continue reading Hack Windows Password in 2 Minutes

Online transaction and Security (cont’d): Spear Phishing

WHAT: Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization or individual, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by “random hackers”, however spear phishing attacks have the same intent; to steal intellectual property, financial data, trade or military secrets and other confidential data. How: Similar but different from the e-mail messages used in regular … Continue reading Online transaction and Security (cont’d): Spear Phishing

LIFE AS A TENECE INTERN

My first encounter with TENECE occurred when I returned for the 2013/2014 academic session at the University of Nigeria, Nsukka. As an electronic engineering student I was quick to recognize that my school’s website had been revamped, the Wi-Fi hotspot was resuscitated, and the online course registration was free from the recurring errors it was prone to. Since then I looked forward to finding out … Continue reading LIFE AS A TENECE INTERN