How To Ensure Your Data Remains Safe In The Cloud

Cloud computing offers computing services such as storage, software, databases and networking over the internet. Anyone using the internet has made use of cloud services in various ways that include hosting websites and blogs, streaming audio and video, creating new applications, storing photos and video and many other services. The most common service that we are all familiar with is email access. We are gradually moving to storing all our documents from our computers to the cloud. However, the main Continue reading “How To Ensure Your Data Remains Safe In The Cloud”

How Third Party Aggregators are making money from Your Private Data

Internet users spend a lot of time on the internet whether on social media or carrying out transactions. There are arguments concerning user data found on different platform and whether it should be considered private or public. Consider data found on a person’s Facebook profile which is considered publicly available. It is even more complex to distinguish private and public data when a person is using a personal device such as a smart phone or Continue reading “How Third Party Aggregators are making money from Your Private Data”

Security Lessons Learnt after Losing Phone

Thanks to technology mobile phones have become a part of our daily life.  We are so much addicted to phones, especially smartphones that have become our “small brains. A lot of important information finds its way in the phone, be it financial plans, weight loss calendar, appointments and so many others in the name of applications. Not to forget the many pictures, selfies, and videos stored in the phone. Continue reading “Security Lessons Learnt after Losing Phone”