MakeUseOf

Chris Odogwu-Staff Writer for Security

Chris Odogwu

Staff Writer for Security

Page 10

About Chris Odogwu

Chris Odogwu is a writer and digital creator. With more than a decade of experience writing professionally, he’s versatile across several niches including cybersecurity, software as a service (SaaS), and digital marketing. 

Chris has built a successful writing career working remotely with reputable organizations. He holds a master's degree in mass communications with a concentration in public relations and advertising from the University of Lagos and a bachelor’s degree in mass communications from the University of Jos. He loves to read, dance and watch interesting movies. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Computer System 1
6 Frontend Security Risks and How to Prevent Them

Backend security is vital, but you still need frontend defenses. Here's how cybercriminals take advantage of any vulnerabilities, and what to do.

network hacker 1
What Is Big Data Analytics and How Does It Help Prevent Cybersecurity Threats?

Big data analytics brings you the information that you need to keep your machines safe and secure.

Work Desk 1
8 Backend Security Risks and How to Prevent Them

It has become even more important to keep your system's backend secure, here's why.

Computer Network 1
What Is Shadow IT and How Can You Manage Security Threats?

Unmonitored tools can be both good and bad for a workplace. Here's what shadow IT is and how you can manage the potential threats to your business.

Network 1
What Is the NIST Cybersecurity Framework?

When thinking about online security, the NIST cybersecurity framework is one of the most popular implementation choices. But what is it?

Cyberattacker 1
5 Times Brute Force Attacks Lead to Huge Security Breaches

Online users are under constant threat from security breaches, and brute force attacks are a particular cause of concern. Here are some of the worst.

The Facebook Messenger app icon 1
Are Facebook Messenger Secret Conversations Really Secure?

What are secret conversations on Facebook Messenger? Are they really as safe as they sound? Here's what you need to know.

Cybersecurity  1
What Is an Incident Response Plan?

What do you do in the event of a security issue or cyberattack? If you're a business, you should be able to turn to an incident response plan.

Girl Surfing the Internet 1
What Every Parent With a Connected Child Should Know

If your children go online regularly, you need to look after them, but how do you actually do that? Here are some security tips to remember.

Woman Wearing Headphone 1
Are You Using Your Headphones the Wrong Way?

You use them every day, but are you destroying your headphones in the process? Here are 6 ways you're using your headphones wrong.

server security privacy 1
What Are Intrusion Detection Systems?

You can help prevent security breaches with an IDS, so what are those systems? And what are the benefits and disadvantages of using them?

TikTok app on a smartphone 1
How Your TikTok Account Can Be Hacked and How to Prevent It

TikTok's fun to get involved in, but you could compromise your security if you're not careful. Here's how to stop hackers from accessing your account.

Ladies Surfing Website 1
How to Check if a Website Is Safe to Use

How can you find out whether a site is secure for you to use? Here's what you need to check every time you visit a site.

 1
What Is Cyber Extortion and How Can You Prevent It?

Cyber extortion poses a significant threat to your online security. But what exactly is it, and how can you ensure that you're not a victim?

Photo of an anonymous hacker using a computer 1
Reactive vs. Proactive Security: Which Is More Effective?

When it comes to security, knowing how you'll tackle potential issues is critical. But what's the best way to approach this?

 1
How to Make Your Data Worthless to Big Tech Companies

The so-called "Big Tech" companies have gained attention for their data-collecting methods, but what can you do to stop them?

MacBook 1
Is AirDrop Secure or Is It a Security Risk?

You can use Apple's AirDrop facility to share files including photos between devices, but is AirDrop safe to use?

Amazon Echo Show 1
How to Use Zoom on Your Amazon Echo Show

We’ll show you how to use Zoom on your Amazon Echo Show for seamless video calls.

Smart Home Interior 1
How to Secure Second-Hand Devices in Your New Smart Home

Here are the security measures you should take when using second-hand devices in your new smart home.

Facebook Portal TV 1
How to Set Up and Use Your Facebook Portal TV for Video Chats

If you own a Portal TV by Facebook, here's how to set it up and use it for video chats with family and friends.

8 9 10 11
Page 10 / 11