What if Nigeria had a Tech-inclined President?

For years, analysts and intellectuals have speculated on what would be the fuel to kick-start Nigeria’s economy to restore, or even surpass, its former glory. Could it be agriculture? Could it be opening more refineries? Could it be technology? Continue reading What if Nigeria had a Tech-inclined President?

Advertisements

Tenecé at Ten: Celebrating ten years of excellence

Tenecé Professional Services, for the past ten years, has lived up to its reputation of being a multi-competency enterprise transformation and technology consulting services firm, that specializes in delivering technology solutions to meet the needs of its clients.

Founded and led by CEO Mr. Kingsley Eze, Tenecé has… Continue reading Tenecé at Ten: Celebrating ten years of excellence

CIMCOR PARTNERS TENECE AS WEST AFRICA CIMTRAK RESELLER

Cimcor an industry leader in developing innovative security, integrity and compliance software solutions as well as a global corporate, government and military initiative driver on protecting critical IT infrastructure has partnered with Tenece professional services to resell Cimcor’s forerunner software product. Cimtrak, a software which monitors critical network device configurations for changes and provides immediate alerting should a change be detected, helps organizations monitor and … Continue reading CIMCOR PARTNERS TENECE AS WEST AFRICA CIMTRAK RESELLER

AVOID iFRAUDSTERS: Do it yourself

The internet is buzzing with all sorts of appealing social networks, groups, associations – the good and bad kind – and the ability to know the difference is the patch that will keep your boat afloat. Ignorant surfers are lunch for hackers; however safe one may feel behind the firewall of an updated antivirus, there is something the software can’t do for you just yet … Continue reading AVOID iFRAUDSTERS: Do it yourself

Hack Windows Password in 2 Minutes

At least, that’s how long it would take a hacker worth his salt to hack into any Microsoft Windows account – 2 minutes! Very worrisome, isn’t it? Goes to show that anyone that thinks his data is safe just because it is tucked away in his “passworded” Windows account would really need to have a rethink. I will not go through the process of how … Continue reading Hack Windows Password in 2 Minutes

Online transaction and Security (cont’d): Spear Phishing

WHAT: Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization or individual, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by “random hackers”, however spear phishing attacks have the same intent; to steal intellectual property, financial data, trade or military secrets and other confidential data. How: Similar but different from the e-mail messages used in regular … Continue reading Online transaction and Security (cont’d): Spear Phishing