Get In Touch:

We are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

1st Floor, Right Wing, 29, Dipeolu Street, Off Obafemi Awolowo Way, Ikeja, Lagos, Nigeria.
info@supportlinktech.com
+234 (0) 809 999 9758
SupportLink

Author: Olusola Oshimade

Data center with server racks in a corridor room

The Most Common & Most Dangerous Types of Shadow IT

What is Shadow IT? Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval. Individuals and departments will stand up rogue systems, applications, and infrastructure to meet their objectives. These objectives could…

Read More
Uber-cyberattack

5 Ways to Prevent the UBER Cyber Breach in Your Organization

The ride tech giant reportedly has suffered a massive security incident, which is likely more extensive than its 2016 data breach and potentially may have compromised its entire network. A hacker on Thursday was believed to have breached multiple internal systems,…

Read More
Social Engineering

How to Prevent Social Engineering Attacks at the Workplace

Social engineering attacks capitalize on the trust that people have in the communications (voice, email, text, etc.) addressed to them. If the message is well-crafted, and potentially even spoofs someone trusted, then the threat actor has already succeeded in the first…

Read More

Vulnerability found in WordPress plugin with over 3 million installations

Updates have been released for UpdraftPlus, a WordPress plugin with over 3 million installations after a vulnerability was discovered by Jetpack security researcher Marc Montpas.  Information gathered has revealed that the Jetpack team “uncovered an arbitrary backup download vulnerability that could…

Read More

Business Continuity Application usually is used to ensure the uninterrupted flow

Business Continuity Application usually is used to ensure the uninterrupted flow of a company’s operations by identifying risks, estimating their disruptive potential, and implementing procedures to mitigate them. #1: Disaster recovery  Disasters sometimes are inevitable. Their unexpected nature is what makes…

Read More