Welcome to SecureMe101

Internet Security is Serious Business. Get Knowledge

SecureMe101's Commitment

To Ensure Online User's Security through Education

SecureMe101's Philosophy

Ignroance is not an Excuse, Acquire Knowledge

Friday, 20 June 2014

12 Fast-Growing, High-Paying Jobs In 2014 (For Youths)



What are the hottest jobs of 2014?
As youths, without much of career guidance and all the advice that could have helped shape our decisions and actions to having a rewarding and competitive career that is in tune with the demands of the industry. I came across this piece, based on scientific data, which reveals some of the jobs/roles that are in tune with the dynamic and ever evolving industries.
CareerBuilder teamed up with Economic Modeling Specialists Intl. (EMSI) to identify the occupations that grew by at least 7% from 2010 to 2013, are projected to grow in 2014, and pay at least $22 per hour.

Wednesday, 18 June 2014

Securing Your Loose Ends (Smartphones and Tablets)




As the world becomes more interconnected, integrated and intelligent, mobile devices are playing an ever-increasing role in changing the way people live, work and communicate. But it is not just happening in personal life: Smartphones and tablets are also being rapidly adopted by enterprises as new work tools, joining existing laptops and desktops. The use of mobile devices for both personal and business has experienced an explosive growth in the past few years and will only accelerate in the near future.

As employees bring mobile devices into the workplace, many organizations are motivated to encourage their use for business purposes, because they tend to drive: Increased employee productivity, reduced IT cost, improved availability and performance, easy access to company resources amongst others. Likewise individuals make use of their smartphones in online shopping, payments, banking, business communication, mobile money and utility bills settlement.
However, there are myriad of risks associated with the use of smartphones and tablets for personal or business concerns. General risks and vulnerabilities include:

  • Loss and theft: Small size and high portability make loss and theft top security concerns when a mobile device is used in the workplace. According to a mobile threat study by Juniper Networks, 1 in 20 mobile devices was stolen or lost in 2010.2When devices are lost or stolen, all of the data stored on or accessible from the mobile device may be compromised if access to the device or the data is not effectively controlled.
  • Malware: Mobile device malware—viruses, worms, Trojans, spyware—has been on the rise over the past few years because most mobile platforms do not yet have native mechanisms to detect malware. Malware can cause a loss of personal or confidential data, additional service charges (for example, some malware can send premium Short Message Service (SMS) text messages or make phone calls in the background) and, even worse, make the device unusable.
  • Spam: With the growth of text messaging, spam—unsolicited communication sent to a mobile device from a known or unknown phone number—is also on the rise.
  • Phishing: “Phishing” is an email or an SMS text message (dubbed,“SMiShing”) sent to trick a user into accessing a fake website, sending a text message or making a phone call to reveal personal information (such as a online banking details in the Nigeria) or credentials that would allow the hacker access to financial or business accounts.
  • Bluetooth and Wi-Fi: Bluetooth and Wi-Fi effectively increase the connectivity of mobile devices within a certain range, but they can be easily exploited to infect a mobile device with malware or compromise transmitted data.

In view of these threats, the following are some foolproof strategies to adopt:

  • Identity and Access: Enforce strong passwords to access the device (alphanumeric = oluwaDamilolA1#), If virtual private network (VPN) access to corporate intranet is allowed, include capability to control what IP addresses can be accessed and when re-authentication is required for accessing critical resources
  • Data Protection: Encrypt business data stored on the device and during transmission, Include capability to wipe data locally and remotely, Set timeout to lock the device when it is not used, Periodically back up data on the device so data restore is possible after the lost device has been recovered, Include capability to locate or lockout the device remotely.
  • Application Security: Download business applications from controlled locations only, Run certified business applications only, Monitor installed applications and remove those identified to be untrustworthy or malicious.
  • Integrity Control: Run anti-malware software to detect malware on storage and in memory, Run a personal firewall to filter inbound and outbound traffic.



Contributions: IBM Security Services

Friday, 24 January 2014

How to Design a Process Flow Chart

Hi Everyone,

In this blog series of Skills for 2014 #GettingRelevant, we shall be engaging ourselves on how to remain relevant in the workplace and adding valuable skills that will propel us to greatness in our chosen fields.
Today, we shall be examining how to design process flow charts in its basic form. A process in an organization is an activity carried out by a unit to bring about a desired outcome. So, as you’ll agree we have many processes in an organization that eventually leads to the desired outcome in form of products and services. There are industry-certifications dealing with process creation, improvement and optimization like Lean and Six Sigma – you can Google and read more.
First step in creating your flowchart is sketching it on a piece of paper, indicating both the start and end positions. Then you decide on which tool to use – Visio, SmartDraw, Word or Excel. We will make use of MS Visio.
In this guide, we will examine a process flowchart for a network implementation. This process has steps defined which are listed in order: Conduct a Needs Analysis and establish Business Case, Management Approval, Technical Site Survey, Gather Requirements, Network Planning and Design, Document Bill of Materials, Project Management/Implementation Plan, Execute, Evaluate Objectives/Optimize and Closing.
Let’s Begin: In your design you need to understand what each flowchart shape means. These are examples of flowchart shapes. So depending on each step of your design will determine what shape to drag to the work area.




So, after listing out your flowchart steps then start dragging the shapes into the work area.



You can use the tools provided in Visio to add text, connectors etc to your chart



After all the adds, deletes, and everything our flowchart diagram will look as follows:



There are tonnes of simple as well as complex designs available online that can help you to come up with a professional flowchart for your software, engineering and other administrative use.
Hope this little information will propel you to take on this skill and add value to yourself.
For ideas and contributions mail me sonde.damilol@gmail.com