BlogHide Reblurtslebey1 in blurttribe • 2 years ago"Unleashing the Power of Hive: Exploring the Thriving Community, Tokenomics, and Mining Potential on the Hive Blockchain"The Hive blockchain and community seem to be among the most underrated on the blockchain. The endless applications and programs that could be built on it make it a blockchain that embodies…lebey1 in blurttribe • 2 years agoCybersecurity: Why it is important to have an Asset Register in a FirmAsset management is an important portion of ensuring information security. How do you keep assets that you don't own safe? Hence the need for a proper and good asset management strategy. The…lebey1 in blurttribe • 2 years agoCybersecurity: Clear Desk and Clear Screen PolicyThe clear desk and Clear screen policy are often handled nonchalantly by firms because they fail to understand their importance. The importance of this policy is to ensure the confidentiality…lebey1 in blurttribe • 2 years agoCybersecurity: Importance of Conducting a VAPT in your OrganisationWith the continuous rise of cybercrimes worldwide, it has become mandatory for firms to employ tools to help harden and tighten their security. A firm security can still be hardened if all staff are…lebey1 in blurttribe • 2 years agoA younger verison of an old modelDreams are part of what makes us humans. Some of the best innovations in the world started with a dream, and then the ideas started rushing out. It is okay to dream, and becoming younger with the…lebey1 in blurttribe • 2 years agoCybersecurity: Getting Documentations right is the first step to ensuring Information securityDocumentation is easy to get right, but it will be funny to know that most organisations struggle to get this right. When we talk about documentation in an organisation, it refers to the soft copies…lebey1 in blurttribe • 2 years agoCybersecurity: How to keep your Mobile phones securedOver 80% of the world's population makes use of mobile phones in today's world. The availability and the outreach have been made possible due to the low cost of acquiring one; with numerous…lebey1 in blurttribe • 2 years agoCryptocurrency: The shitcoin season is upon usEvery season has its perks, and 2023 has been full of that. Many activities seem to be increasing on the blockchain, exponentially resulting in the influx of new projects scattered across the…lebey1 in blurttribe • 2 years agoCybersecurity: What differentiates Routers from SwitchesTechnology has come a long way from the way it used to be. This has also impacted the growth of computers, as computers have gone from occupying blocks of rooms to being portable in this age.…lebey1 in blurttribe • 2 years agoCybersecurity: Firewalls Versus Security guardSecurity guards stationed at office premises are to provide physical security and protect the information, assets and people who access the Organisation building. The security guard, when used…lebey1 in blurttribe • 2 years agoWhat really mattersThe world as we know it keeps changing from the one we are used to living in 10 years ago, and in truth, the world will be different in 20 years’ time. With the improvement in technology, which has…lebey1 in blurttribe • 2 years agoFour things i have learnt from involving myself in Cryptocurrencysource A lot of terms has coined about what cryptocurrency is supposed to be. Everyone has his or her own opinion, and even the critics and government have something to say. The technology might…lebey1 in blurttribe • 2 years agoCybersecurity: Getting Documentations right is the first step to ensuring Information securityDocumentation is easy to get right, but it will be funny to know that most organisations struggle to get this right. When we talk about documentation in an organisation, it refers to the soft copies…lebey1 in blurttribe • 2 years agoPersonal Development: Pratice what you learnWith the amount of knowledge and resources available in the world today, it is very easy to be easily overwhelmed with the information available at their disposal. The world we know today has…lebey1 in blurttribe • 2 years agoCybersecurity: How Firms Mobile devices and BYOD devices should be handled to ensure Information securityEvery component and part that carries, stores and processes information is important in cybersecurity, regardless of how small they might look. It is so easy to discard some company assets such as…lebey1 in blurttribe • 2 years agoCybersecurity: How best to prevent the impact of Insider threat in an organisationHumans are the biggest risk to ensuring the confidentiality, integrity and availability of information assets. While untrained staff and unmotivated staff might reduce the performance of the…lebey1 in blurttribe • 2 years agoMy thoughts on the Hakimi storyYesterday happened to be a very busy day on the internet as the story of what Paris saint germain (PSG) defender called Hakimi did. It is no longer news, but I decided to drop my two cents on the…lebey1 in blurttribe • 2 years agoKey esstential tools to ensure security on the networkCybersecurity is going nowhere soon, and it's important that we prepare for more advanced attacks as technology develops further. The development experience in the technological world seems to have…lebey1 in blurttribe • 2 years agoPassword ManagementThe most common way hackers breach a system is through the password. Password is usually the first line of defence that shows a system that you are who you say you are, i.e. the password…lebey1 in blurttribe • 2 years agoCybersecurity: why an Access Control Audit should be conducted for personal devicessource Cybersecurity involves all assets linked to the internet, so auditing your device on your own will help prevent breaches. Conducting an access control audit on your information assets…