Post on Medial

Comment down your thoughts.✨ In today's corporate cyber landscape, employee carelessness is a significant concern. Whether through inadvertently clicking malicious links or sharing sensitive information without proper safeguards, their actions can l

See More

Aman Shah

Stealth • 6m

What if that app has zero days which is actively exploited by the cyber criminals, and your company or that software provider company doesn't know about that vulnerabilities. If you installed antivirus or any end point security solutions that doesn't mean you are completely safe from online threats. End user or employee should know the basics of cyber hygiene for its and it's company's online security. Because humans are easily hackable entity in the universe.

0 replies

More like this

Recommendations from Medial

Anonymous

Just as a caution for a lot of you. When opening a digital Demat account on any investing platform be very careful. Given the poor cyber security environment, the risk of your Kyc being leaked or sold is very much there. Just pathetic and irrespons

See More
0 replies4 likes

Slayer

Stealth • 10h

I am working on a self evolving cyber security network which can fit into any company's network and will keep on attacking itself and learning on it's own on to mitigate attacks and using decentralized sharing of the new attack vectors and solutions

See More
0 replies1 like
Image Description

Dofl

Stealth • 6m

A message that grades doesn't justify someones passion or talent

1 replies6 likes
Image Description
Image Description

Tanay Shrivastava

Stealth • 6m

Hi! I'm looking to #Connect with people who are interested in 🌐 Web Development 🎨 FrontEnd 🚨 Backend 💹Data Science 🕵️Cyber security 🎖️ Intership 🤖AI ML 🦏 Javascript ✅ Development 🏗️ Building online 🚀UI/UX 📂 Open Source 💻 Electronic

See More
4 replies2 likes
Image Description

ratan

Stealth • 1m

The human mind is the easiest to trick. Guess what, we've been tricking ourselves to believe in something that doesn't even exist, but provides psychological security that there's something higher that rules us.

5 replies1 like
Image Description
Image Description

Kaivalya Satpute

Stealth • 8m

Individual who have skill set like 1)profit making 2)tech developer 3)block chain developer 4)cyber security Are need to form my startup for long term Anyone interested or have any suggestions please 🙏 Let me know on kaivalyasatpute55@gmail.

See More
3 replies3 likes
Image Description
Image Description

SHIV DIXIT

Stealth • 7m

💀10 year old girl died on his birthday because he ordered cake from Zomato after eaten the cake he died. police and Zomato is not able to find address of that cloud kitchen because of app vulnerabilities . At the end there no justice.

3 replies5 likes

Vasvi Seth

Stealth • 4m

Understanding Network Protocols: The Backbone of Digital Communication In the world of networking, protocols are crucial. A network protocol is essentially a set of rules used by two or more devices on a network to dictate the delivery and structure

See More
0 replies5 likes
Image Description
Image Description

Sameer Patel

Stealth • 5m

User privacy concerns on telegram. Telegram founder Pavel Durov revealed in an interview that the company employs only "about 30 engineers," which has raised concerns among security experts. Telegram, unlike Signal, does not default to end-to-end e

See More
8 replies4 likes
Image Description
Image Description

SamCtrlPlusAltMan

 • 

OpenAI • 5m

Been there. Done that. One security threat or share price fall away until the same people push him away. 😀

7 replies10 likes
1

Download the medial app to read full posts, comements and news.