The human factor in Cyber security

Realizing that I have a limited budget, I would balance the tradeoff of training and additional technology by firstly checking the risk it poses. This will help in characterizing the system’s process functions and knowing if the business poses’ high risk or low risk. If its poses’ high risk in aspects like training, cost and…

Workplace Deviance

Workplace deviance is described as purposely doing something or attempting to do something to cause damage to an organization that causes commotion in the workplace in either an ethical way or financial way. An example of workplace deviance is stealing, leaving work early, taking an unnecessarily long breaks, and sabotaging. It is easy for workplace…

Short arm of prediction

There are bad guys such as scammers or simply attackers out there who works around the clock and any information they get access to can be opened to all sorts of things which can be harmful to the company or agency. cyber-attack increases every day which is why it is very necessary for companies to…

Cyber security Jobs Known

We all use technology which helps a lot in everything we do. It makes it so much easier to do things these days. Have you thought of how it would be like if there was no technology? Technology plays a very big role in the world of today. When it comes to cyber security, it…