MANAGING THE RISKS OF USING POS SERVICES.

    BACKGROUND. Traditionally, customers had to physically go to the bank and pick up a withdrawal or deposit slip to move monies. Subsequently, Automated Teller Machines (ATM), as well as mobile and internet banking services were introduced and this caused a reduction in the footfall to banking halls.  In 2013 the Central Bank of […]

TEN SIGNS THAT YOUR DEVICE HAS BEEN HACKED.

Information uploaded on the internet can be accessed and manipulated by cyber-intruders and online predators commonly referred to as hackers. Any device connected to the Internet is susceptible to the activities of these hackers who typically operate through spam messages, phishing emails or instant messages and compromised websites. There are certain signs that manifest once […]

HOW TO ENABLE TWO FACTOR AUTENTICATION

The internet is a vast space where near endless information is stored, shared and processed. There are attendant risks of this abundantly rich mine of information falling into the wrong hands and being misused. To address this, it has been necessary for arrangements to be made for the security of the information and the processing […]

WHY YOU SHOULD THINK TWICE BEFORE YOU POST THAT ONLINE!

The internet is a vast space, where over 5 billion users communicate and interact by private messages, video chat, blogs and uploading content of their lives daily. Sharing information is human nature, we love sharing our happiness like marriage, birthdays, promotion, new business on social media platforms like Facebook, Instagram, X, Snapchat. This development is a […]