Security
MTN Zambia Simplifies self SIM Registration Online
As required by Zambia Information and Communications Technology Authority (ZICTA) you can now easily do sim registration all by yourself. MTN Zambia has made it easier for customers to register their SIM cards by launching an online registration portal at https://myreg.mtn.zm. The move comes as part of the company’s efforts to comply with the regulations…
Read MoreWhat is Shadow IT? Here is a very short version and why it’s not recommended.
The drawback of Shadow IT is that it poses a significant security risk to organizations.
Read MoreFacts about TLS 1.0 and SSL
Transport Layer Security (TLS), the successor of the now-deprecated Secure Sockets Layer (SSL), is a cryptographic protocol designed to provide communications security over a computer network. It’s Dangerous to Use Outdated TLS Security Protocols TLS 1.0 was first defined in RFC 2246 in January 1999 as an upgrade of SSL Version 3.0, and written by Christopher Allen and Tim Dierks of Consensus Development.…
Read MoreWhose Zambian phone number is on the Pegasus spyware list?
With over 50, 000 mobile numbers claimed all over the world to be on NSO spyware software whose Zambian phone number is on the Pegasus Project Data? The quick answer is – Is Pegasus spyware even here in Zambia? This information technology content is localized and part of Lensesview simple review updates about world technology…
Read MoreRecent data breaches you could have been pawned in
A data “breach” is an incident where private and secured data has been intentionally or unintentionally exposed, leaked, or spilled to the public or untrusted environment. Data breaches are very common even in Zambia where database owners have failed to secure or intentionally leak users’ information. There are several websites that keep a record of…
Read MoreCyber Issues Affecting Africa
Just last week an African Union cybersecurity group listed serious cyber issues affecting Africa and on top of the list was the vital role of mobile technology, software issues, signaling, and the users themselves. This was in a Zoom Webinar organized by the African Union Commission “Webinar on Cybersecurity in Africa: Rising for the new…
Read MoreGoogle improves 2-Step verification with phone sign-in prompts
Securely signing in to Google just got easier as Google is improving 2-Step Verification so everyone can use Google prompts to sign-in securely and better protect their accounts. Instead of using a 2-Step Verification code to sign in, you can tap a prompt that Google sends to your phone. The prompt will ask if you’re trying to…
Read MoreWhat are the 12 networking truths RFC1925
The 12 Networking Truths sometimes referred to as RFC1925 RFC or Request for Comments is a set of truths that apply to real-world situations not only in the TCP/IP networking and security world. A first read of the twelve networking truths makes for fun reading but any ‘graduated’ tech guy would concur they are more…
Read MoreAre IT Managers in Zambia ready for work from home
Are IT Managers in Zambia ready for work from homes as coronavirus finally take shape in Zambia with two cases reported yesterday and is yet to cause real panic? Yes, companies must start asking now if their IT Managers and the resources running the company telecommunication are ready to shape up to the task. In…
Read MoreMicrosoft Basic Authentication Retirement
Microsoft will be retiring Basic Authentication for EWS, EAS, IMAP, POP and RPS. This means anyone using any application that doesn’t use ‘OAuth 2.0’ protocol for authorization will have access issues to Office 365 and Exchange Online. However, Exchange Admins should note that this change does not impact SMTP AUTH. Also, these changes will effect…
Read More
You must be logged in to post a comment.