MakeUseOf

Chris Odogwu-Staff Writer for Security

Chris Odogwu

Staff Writer for Security

Page 9

About Chris Odogwu

Chris Odogwu is a writer and digital creator. With more than a decade of experience writing professionally, he’s versatile across several niches including cybersecurity, software as a service (SaaS), and digital marketing. 

Chris has built a successful writing career working remotely with reputable organizations. He holds a master's degree in mass communications with a concentration in public relations and advertising from the University of Lagos and a bachelor’s degree in mass communications from the University of Jos. He loves to read, dance and watch interesting movies. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Woman Thinking at Work 1
How to Identify and Overcome Mental Blocks: 6 Ways

If you find yourself stuck and unable to do things you want, you may be experiencing mental blocks. Here are some ways you can get over them.

photo of someone shopping online 1
6 Online Shopping Security Threats and How to Avoid Them

Online shopping is a convenient way to buy consumer items, but it's far from risk-free.

Man Stressed at Work 1
What Is Work Overload and How Can You Avoid It?

Do you always feel overwhelmed or stressed at work? There are chances you might be experiencing work overload. Here's how you can avoid it!

Credit Cards on Keyboard 1
What Is Attack Surface Management and Why Is It Important?

Attack Surface Management (ASM) is an emerging cybersecurity strategy that can help you better manage your online security. Here's why it's important!

Woman Tired at Work 1
6 Great Ideas to Create an Effective Weekly Work Plan

Want to start your work week in the best possible way? Here are some ways on how to be more efficient with a weekly work plan.

Touchscreen Computer Device 1
What Is Session Hijacking and How Can You Prevent It?

A session hijacking is a situation where an attacker hijacks your active web session. Here's how you can prevent it!

Picture of a laptop on a table 1
What Is Network Scanning and How Does It Work?

Being proactive will help you stop the threat of cyberattacks.

Illustration of a hacker 1
What Is DNS Hijacking and How Can You Prevent It?

DNS hijacking poses a huge threat to internet users. But how can you stop if from happening?

Hacker at a desk laptop 1
6 Types of "Hat" Hackers and How They Operate

Do you know the difference between black, white, gray, red, blue, and green hat hackers? Here's what each type of hacker does.

Cyberattacker 1
What Is the POODLE Attack and How Can You Prevent It?

We use SSL and TLS protocols to keep connections secure. But even older versions can put your data at risk. Here's what you need to know.

Cyberattack 1
What Is Remote File Inclusion (RFI) and How Can You Prevent It?

Remote File Inclusion (RFI) is an attack that attempts to access external URLs and remote files in your network. Here's how you can prevent it!

Web Application 1
What Is Broken Link Hijacking and How Can You Prevent It?

If you visit a website with broken external links, that site might have been compromised by cybercriminals looking to damage reputations and scam you.

Network Security 1
What Is Forced Browsing and How Does It Work?

Forced Browsing is a basic attack but it can be rewarding and it's easy to automate. Make sure you protect your pages and site resources against it.

Illustration of business being done online 1
6 Best Web Application Security Practices to Prevent Cyberattacks

Preventing cyberattacks is crucial, and being smart while using web apps will help you protect yourself online.

Network Scanning 1
What Is Vulnerability Scanning and How Does It Work?

How do you prevent cyberattacks before they even happen? One solid way is by conducting a vulnerability scan. Here's what that involves.

Work Desk 1
What Is Sensitive Data Exposure and How Is It Different From a Data Breach?

Find the difference between the two and learn how to protect yourself in our increasingly online world.

online security privacy 1
5 Cybersecurity Myths That Make You More Vulnerable to Attacks

A lot of conflicting information exists about cybersecurity. So, what shouldn't you believe?

Home office 1
What Is Endpoint Security and Why Is It Important?

Organizations face an increasing number of cyber threats. How can endpoint security help out?

cybersecurity-goals 1
How to Set and Achieve Your Cybersecurity Goals

You don't need to be put off by the idea of implementing strong cybersecurity measures. Here's how to make your systems secure and why you need to.

cyber hacker 1
What Are Injection Attacks and How Can You Prevent Them?

Injection attacks can allow hackers to gain access to the internals of your system. We'll show you exactly how they work and how to prevent them.

7 8 9 10 11
Page 9 / 11