INFOGRAPHIC: How Safe Is Your Mobile Data?

Mobile apps are pervasive. They are being created and downloaded at a staggering rate. It is estimated that 179 billion apps will be downloaded in 2015. That’s a 41% increase over 2014 download totals. Plus, more than 60,000 new apps are added to the Apple App Store per month. Unfortunately, security of data is not always top of mind during development. Apps are storing data insecurely, are vulnerable to man-in-the-middle attacks, and leak your sensitive data. In fact, an alarming 15% of all apps leak sensitive data over the network (plain text or encoded), and 48% of mobile applications have at least one high risk security flaw.

Spotlight

iWayAfrica

iWayAfrica Nigeria Limited (INL) is one of the largest Broadband and IT Solution providers in Nigeria. The company started operations in 2003, then trading as MWEB Nigeria and has since expanded its product portfolio and reaches nationwide. iWayAfrica Nigeria Limited is a subsidiary of iWay Africa (a member of the Telkom SA Ltd), the largest VSAT providers in Africa with presence in over 40 African countries.

Other Infographics
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More

Spotlight

iWayAfrica

iWayAfrica Nigeria Limited (INL) is one of the largest Broadband and IT Solution providers in Nigeria. The company started operations in 2003, then trading as MWEB Nigeria and has since expanded its product portfolio and reaches nationwide. iWayAfrica Nigeria Limited is a subsidiary of iWay Africa (a member of the Telkom SA Ltd), the largest VSAT providers in Africa with presence in over 40 African countries.

Events