HURRAY!!! ITS OUR 11TH ANNIVERSARY TODAY. Tenece Professional services, popularly known as Tenece, is a fast growing Information Technology (IT) Company, which has over the years created a niche for itself in the advanced technology world and beyond. Tenece at just eleven years of operation has copped for itself many notable awards and has vastly expanded with over 250 staff and branches in Nigeria, Ghana, … Continue reading THE TENECE EXPERIENCE: We Consult, We Implement and We Manage.
For years, analysts and intellectuals have speculated on what would be the fuel to kick-start Nigeria’s economy to restore, or even surpass, its former glory. Could it be agriculture? Could it be opening more refineries? Could it be technology? Continue reading What if Nigeria had a Tech-inclined President?
Tenecé Professional Services, for the past ten years, has lived up to its reputation of being a multi-competency enterprise transformation and technology consulting services firm, that specializes in delivering technology solutions to meet the needs of its clients.
Founded and led by CEO Mr. Kingsley Eze, Tenecé has… Continue reading Tenecé at Ten: Celebrating ten years of excellence
Cimcor an industry leader in developing innovative security, integrity and compliance software solutions as well as a global corporate, government and military initiative driver on protecting critical IT infrastructure has partnered with Tenece professional services to resell Cimcor’s forerunner software product. Cimtrak, a software which monitors critical network device configurations for changes and provides immediate alerting should a change be detected, helps organizations monitor and … Continue reading CIMCOR PARTNERS TENECE AS WEST AFRICA CIMTRAK RESELLER
AS THE TRADITION IS IN TENECE to always support its clients in overcoming business challenges, we offer an EXCLUSIVE bonanza!
The management of an IT infrastructure today requires the need to unify machine data across the organizations Information systems. Continue reading Enterprise Data collection, storage, and analysis
How can one have holistic view and understanding of all the events and potential abuses that are taking place within an organization?
How can one collect and correlate the different activities happening on critical networks. Continue reading Effective Security Information and Event Management
The internet is buzzing with all sorts of appealing social networks, groups, associations – the good and bad kind – and the ability to know the difference is the patch that will keep your boat afloat. Ignorant surfers are lunch for hackers; however safe one may feel behind the firewall of an updated antivirus, there is something the software can’t do for you just yet … Continue reading AVOID iFRAUDSTERS: Do it yourself
At least, that’s how long it would take a hacker worth his salt to hack into any Microsoft Windows account – 2 minutes! Very worrisome, isn’t it? Goes to show that anyone that thinks his data is safe just because it is tucked away in his “passworded” Windows account would really need to have a rethink. I will not go through the process of how … Continue reading Hack Windows Password in 2 Minutes
Security breaches rocked 2014. Remember SONY? Yeah!!! Before that, there was WikiLeaks, Bradley manning, and there was Edward Snowden. I am not here to argue the morality of their actions or justify if such information should have been leaked or not….I really could care less. The point I am trying to make though, is the effect it had on the corporations that lost what they … Continue reading WHY DLP?
WHAT: Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization or individual, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by “random hackers”, however spear phishing attacks have the same intent; to steal intellectual property, financial data, trade or military secrets and other confidential data. How: Similar but different from the e-mail messages used in regular … Continue reading Online transaction and Security (cont’d): Spear Phishing