Skip to main content

Week 5

 The use of social media and things to avoid. 


 

Online social media is particularly important today. We use it to share messages, photos, and videos via the internet. There is risk involved with online social networks. Business and individuals can use Online social media to educate people about the risk of connecting or using the Internet as a common goal. Users need to be aware of the risk involved when using online social networks and how to safely use social media. 


Avoid using public internet like local coffee shops or the airport, if you must use public internet, it is advisable to follow certain protocol. Avoid creating accounts and disclosing your birthdate, email address, where you live that way, your personal info is protected. Control who can view your profile and photos by setting permissions and change privacy settings periodically. 

Choose friends wisely by understanding which friend request to accept for some request might come from identity theft who created a fake profile to obtain your personal information. Limit friends on social media, so not try to have lots of friends on your social media network. Be incredibly careful about you post on social media for whatever you post might go public so give only information that are relevant when posing.

Beware of scammers, try and avoid emergency request for financial assistance and do not respond to messages containing lottery you did not enter or fabulous too good to be true. Always evaluate a website’s privacy policy that explains how it uses your personal information, external websites or application may have access to your information. 

Comments

Popular posts from this blog

System Hardening Week 12.

  Network automation offers several compelling benefits, and its impact on IT professionals is significant. Below are some advantages.   Benefits of Network Automation: It eliminates manual tasks by automating network processes. This boosts IT productivity, allowing professionals to focus on strategic initiatives that drive business growth. Network automation enables faster provisioning of critical data services, optimizes network performance, and speeds up the rollout of new services and applications. Previously infrequent network changes have become more frequent due to automation, reducing manual adjustments' time-consuming and resource-intensive nature. It helps build a reliable network for an infrastructure-as-code approach that consistently maintains network state and configuration, enhancing reliability from data centers to edge location...

Week 8

  Most recent Cybersecurity attacks: 2022     British Council data breach   The British Council, which provides English language courses to students worldwide, experienced a third-party data breach revealing more than 10,000 records. Researchers discovered an unprotected Microsoft Azure blob repository and reported the incident on the 5th of December 2021.       The blob container (a group of data held in the cloud) was indexed by a public search engine. Clario Tech reported in a Mackeeper blog that the blob contained at least 144k xls , xlsx, xml, and Json files.       The datasets held students’ personal data worldwide, including student IDs, full names, study duration, email addresses, and enrolment dates.       Any student or individual that may have been affected by the data breach should change their password straight away. They should also watch out for suspicious-looking emails and links.   The NHS Trus...

System hardening and networking week 5

  A Virtual Local Area Network (VLAN) is a logical network that groups devices based on their functionality, location, or security requirements. Here are some advantages of VLANs: Advantages: Improved network performance: VLANs can reduce congestion by segmenting the network into smaller broadcast domains. This reduces the amount of traffic that needs to be processed by each device, leading to faster network speeds. Enhanced network security: VLANs can isolate sensitive data and restrict access to it. This helps prevent unauthorized access to confidential information and reduces the risk of data breaches. Simplified network management: VLANs can simplify network management by allowing administrators to manage groups of devices as a single entity. This reduces the complexity of network management and makes it easier to troubleshoot network issues. Flexibility: VLANs can be easily reconfigured to meet changi...