talk_2_josh's profile picture. Medical//Cybersecurity

Joshua Nwibo

@talk_2_josh

Medical//Cybersecurity

Joshua Nwibo reposteó

How Email Phishing Works

SecurityTrybe's tweet image. How Email Phishing Works

In todays interconnected world, mobile phone has become an extension of the body. Mobile phones have evolved to make life convenient, but there are associated risks. Cyber criminals are increasingly targeting the mobile phone for their exploits. Safety Tips 👇

talk_2_josh's tweet image. In todays interconnected world, mobile phone has become an extension of the body. Mobile phones have evolved to make life convenient, but there are associated risks.
Cyber criminals are increasingly targeting the mobile phone for their exploits. 

Safety Tips 👇

DAY 9 OF CYBER AWARENESS PUBLIC WI-FI Most times you want to use public wifi (at hotels, airports,etc.) because they are FREE. They are often not secure, making your data vulnerable to threat actors. #CyberAwareness #OnlineSafety @AfriTechX

talk_2_josh's tweet image. DAY 9 OF CYBER AWARENESS 

PUBLIC WI-FI 

Most times you want to use public wifi (at hotels, airports,etc.) because they are FREE. They are often not secure, making your data vulnerable to threat actors.

#CyberAwareness 
#OnlineSafety
@AfriTechX

To stay safe and ensure that your devices function properly, always update them. Software update is a way of improving security of devices by patching vulnerabilities, enhancing performance by introducing new features. #CyberAwareness #OnlineSafety @AfriTechX

talk_2_josh's tweet image. To stay safe and ensure that your devices function properly, always update them.
Software update is a way of improving security of devices by patching vulnerabilities, enhancing performance by introducing new features.
#CyberAwareness 
#OnlineSafety 
@AfriTechX


📌

Social Engineering: The Human Hacking Epidemic- A Thread 🧵 Social engineering exploits our natural tendencies, curiosity, fear, or kindness to bypass security. It’s not about cracking code; it’s about cracking people. In 2025, with remote work and digital overload, it’s more…

SecurityTrybe's tweet image. Social Engineering: The Human Hacking Epidemic- A Thread 🧵 

Social engineering exploits our natural tendencies, curiosity, fear, or kindness to bypass security. It’s not about cracking code; it’s about cracking people. 

In 2025, with remote work and digital overload, it’s more…


To stay safe and ensure that your devices function properly, always update them. Software update is a way of improving security of devices by patching vulnerabilities, enhancing performance by introducing new features. #CyberAwareness #OnlineSafety @AfriTechX

talk_2_josh's tweet image. To stay safe and ensure that your devices function properly, always update them.
Software update is a way of improving security of devices by patching vulnerabilities, enhancing performance by introducing new features.
#CyberAwareness 
#OnlineSafety 
@AfriTechX

DAY 6 OF CYBER AWARENESS BACKUP: Safety Net Against Ransomware. Backups are the most effective way to recover from a ransomware attack. To serve as a true safety net, backups must be implemented and secured using specific strategies. #Cyberawareness #Onlinesafety @AfriTechX

talk_2_josh's tweet image. DAY 6 OF CYBER AWARENESS 

BACKUP: Safety Net Against Ransomware.

Backups are the most effective way to recover from a ransomware attack. To serve as a true safety net, backups must be implemented and secured using specific strategies.
#Cyberawareness 
#Onlinesafety 
@AfriTechX


📌📌

Ransomware Attack: Ransomware is a type of malicious software (malware) that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. Process: 1. Attacker sends Phishing Email→ User receives a link and clicks. 2. Malware unpacks and…

SecurityTrybe's tweet image. Ransomware Attack:

Ransomware is a type of malicious software (malware) that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. 

Process:
1. Attacker sends Phishing Email→ User receives a link and clicks.

2. Malware unpacks and…


Joshua Nwibo reposteó

Ransomware Attack: Ransomware is a type of malicious software (malware) that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. Process: 1. Attacker sends Phishing Email→ User receives a link and clicks. 2. Malware unpacks and…

SecurityTrybe's tweet image. Ransomware Attack:

Ransomware is a type of malicious software (malware) that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. 

Process:
1. Attacker sends Phishing Email→ User receives a link and clicks.

2. Malware unpacks and…

Happy new week x.com/talk_2_josh/st…

It's week. Think before you post Internet never forgets Think before you post Internet never forgets Think before you post Internet never forgets Think before you post Internet never forgets Think before you post Internet never forgets.



Joshua Nwibo reposteó

It's week. Think before you post Internet never forgets Think before you post Internet never forgets Think before you post Internet never forgets Think before you post Internet never forgets Think before you post Internet never forgets.


DAY 6 OF CYBER AWARENESS BACKUP: Safety Net Against Ransomware. Backups are the most effective way to recover from a ransomware attack. To serve as a true safety net, backups must be implemented and secured using specific strategies. #Cyberawareness #Onlinesafety @AfriTechX

talk_2_josh's tweet image. DAY 6 OF CYBER AWARENESS 

BACKUP: Safety Net Against Ransomware.

Backups are the most effective way to recover from a ransomware attack. To serve as a true safety net, backups must be implemented and secured using specific strategies.
#Cyberawareness 
#Onlinesafety 
@AfriTechX

DAY 4 Phishing is a form of social engineering. The aim is to trick individuals into revealing sensitive personal or financial information such as passwords, credit card numbers or bank details. more ⬇️⬇️

talk_2_josh's tweet image. DAY 4

Phishing is a form of social engineering. The aim is to trick individuals into revealing sensitive personal or financial information such as passwords, credit card numbers or bank details. 

more ⬇️⬇️

Joshua Nwibo reposteó

Strong Password Practices

SecurityTrybe's tweet image. Strong Password Practices

DAY 2 OF CYBER AWARENESS To add to the list... 6. Do not use one password across all your accounts #cyberawarenessmonth #OnlineSafety

talk_2_josh's tweet image. DAY 2 OF CYBER AWARENESS 
To add to the list...
6. Do not use one password across all your accounts 

#cyberawarenessmonth 
#OnlineSafety

Stay cyber safe 🙏

Happy CSA month to all who celebrate.



United States Tendencias

Loading...

Something went wrong.


Something went wrong.