Google 2-step verification includes Google prompts on phone

Google improves 2-Step verification with phone sign-in prompts

Securely signing in to Google just got easier as Google is improving 2-Step Verification so everyone can use Google prompts to sign-in securely and better protect their accounts. Instead of using a 2-Step Verification code to sign in, you can tap a prompt that Google sends to your phone. The prompt will ask if you’re trying to […]

12 networking truths

What are the 12 networking truths RFC1925

The 12 Networking Truths sometimes referred to as RFC1925 RFC or Request for Comments is a set of truths that apply to real-world situations not only in the TCP/IP networking and security world. A first read of the twelve networking truths makes for fun reading but any ‘graduated’ tech guy would concur they are more […]

Wifi routers are the starting point for IT Managers in Zambia who seek to ready for work from home

Are IT Managers in Zambia ready for work from home

Are IT Managers in Zambia ready for work from homes as coronavirus finally take shape in Zambia with two cases reported yesterday and is yet to cause real panic? Yes, companies must start asking now if their IT Managers and the resources running the company telecommunication are ready to shape up to the task. In […]

Lensesview will give you updates on Artificial Intelligence

Microsoft Basic Authentication Retirement

Microsoft will be retiring Basic Authentication for EWS, EAS, IMAP, POP and RPS. This means anyone using any application that doesn’t use ‘OAuth 2.0’ protocol for authorization will have access issues to Office 365 and Exchange Online. However, Exchange Admins should note that this change does not impact SMTP AUTH. Also, these changes will effect […]

iPhone x with face id enhance security of the mobile phone

Zamtel Biometrics data capturing will improve online safety- says Kamanga

LUSAKA, 3rd February 2020 – State-owned telecommunications company Zamtel says capturing facial biometrics of all mobile phone customers is an important step towards the prevention of mobile fraud. Giving an update on the ongoing sim card verification exercise, Zamtel Head of Corporate Affairs and Government Relations Reuben Kamanga stressed that with growing reports of online […]

Apple two-factor authentication finally available for Zambia 1

Apple two-factor authentication finally available for Zambia

Apple’s two-factor authentication for Apple ID and cloud services has finally been made available for Zambia. Since its implementation in October 2015, Apple’s two-factor authentication has failed to work for Zambia as the country’s telephone code +260 was not available as a selection in the prebuilt form that required to be filled. Two-factor authentication is […]

Microsoft says please update your windows patch right now

Hackers turned on my camera and recorded me

Hackers are really the scam of the earth and will try to do anything to get a bit of your money through phishing and spam tools. In recent years email threats have increased checking the number of overwhelming reports from Zambian internet users. We have become crucial targets from hackers who want to symphony every […]

The Impossible Puzzle of Cybersecurity

Two out of three organizations fell victim to a cyberattack in 2018

Two out of three organizations fell victim to a cyberattack in 2018 shows results of an independent survey of 3,100 IT managers commissioned by Sophos. Cybersecurity just isn’t getting any easier. While protection technologies continue to advance at a rapid pace, so do the cybercriminals trying to circumvent them. At the same time, the growing […]

You Can Now Install Sophos XG Firewall On Virtual Machines

You Can Now Install Sophos XG Firewall On Virtual Machines

Sophos Firewall XG installation is supported on virtual machines such as Windows Hyper-V, Microsoft Azure and VMware. Sophos Firewall XG is a network security solution that can be installed as a device on-premise or in the cloud. Sophos XG business services may require purchasing a device or like the home solution turning an ordinary compatible […]

3 important security tips for your email

3 important security tips for your email

The advent of technology has brought means of easier communication on which our lifestyles have come to be built on. For instance, your email address is critical to accessing most resources residing over the internet or online accounts. For the average internet user, these include banking, shopping, access to online academic credentials and certificates, even […]