Security
How to Report Scam Messages to ZICTA in Zambia
In today’s digital age, our smartphones have become an integral part of our lives, keeping us connected and informed not until they are tools for scam and security breach
Read MoreIn 2023 What Apple Devices Support Face ID
Face ID uses a combination of hardware and software to identify and authenticate a user’s face for various purposes
Read MoreWhat is the difference between Sophos Firewall rules and NAT rules
Sophos Firewall device has two types of rules: the firewall rules and NAT (Network Address Translation) rules. Here’s a brief explanation of the difference between these two types of rules
Read MoreMTN Zambia Simplifies self SIM Registration Online
As required by Zambia Information and Communications Technology Authority (ZICTA) you can now easily do sim registration all by yourself. MTN Zambia has made it easier for customers to register their SIM cards by launching an online registration portal at https://myreg.mtn.zm. The move comes as part of the company’s efforts to comply with the regulations…
Read MoreWhat is Shadow IT? Here is a very short version and why it’s not recommended.
The drawback of Shadow IT is that it poses a significant security risk to organizations.
Read MoreFacts about TLS 1.0 and SSL
Transport Layer Security (TLS), the successor of the now-deprecated Secure Sockets Layer (SSL), is a cryptographic protocol designed to provide communications security over a computer network. It’s Dangerous to Use Outdated TLS Security Protocols TLS 1.0 was first defined in RFC 2246 in January 1999 as an upgrade of SSL Version 3.0, and written by Christopher Allen and Tim Dierks of Consensus Development.…
Read MoreWhose Zambian phone number is on the Pegasus spyware list?
With over 50, 000 mobile numbers claimed all over the world to be on NSO spyware software whose Zambian phone number is on the Pegasus Project Data? The quick answer is – Is Pegasus spyware even here in Zambia? This information technology content is localized and part of Lensesview simple review updates about world technology…
Read MoreRecent data breaches you could have been pawned in
A data “breach” is an incident where private and secured data has been intentionally or unintentionally exposed, leaked, or spilled to the public or untrusted environment. Data breaches are very common even in Zambia where database owners have failed to secure or intentionally leak users’ information. There are several websites that keep a record of…
Read MoreCyber Issues Affecting Africa
Just last week an African Union cybersecurity group listed serious cyber issues affecting Africa and on top of the list was the vital role of mobile technology, software issues, signaling, and the users themselves. This was in a Zoom Webinar organized by the African Union Commission “Webinar on Cybersecurity in Africa: Rising for the new…
Read MoreGoogle improves 2-Step verification with phone sign-in prompts
Securely signing in to Google just got easier as Google is improving 2-Step Verification so everyone can use Google prompts to sign-in securely and better protect their accounts. Instead of using a 2-Step Verification code to sign in, you can tap a prompt that Google sends to your phone. The prompt will ask if you’re trying to…
Read More