Channel address:
Categories:
Technologies
Language: English
Subscribers:
1.09K
Description from channel
🍁Cyber Security ❤️
🍁Hacking Resources 👨💻
Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂
📰Promotion/Query - @geekcodevipbot
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
1
4 stars
0
3 stars
1
2 stars
1
1 stars
0
The latest Messages 25
2021-09-30 13:42:21
The top 5 trending programming languages for mobile application developmenthttps://telegra.ph/The-Top-5-trending-programming-languages-for-App-development-09-30@geekcode
103 views10:42
2021-09-29 09:41:14
Learn the fundamental of cloud computing in 6 months
https://learntocloud.guide/@geekcode
76 views06:41
2021-09-29 09:39:45
This document outlines best practices for writing high-performance Go code.https://github.com/dgryski/go-perfbook
@geekcode
76 views06:39
2021-09-27 20:30:03
Top 10 trending technologies in 2021
• 5G Technology
• Internet of Behaviours(IoB)
• DevSecOps
• Intelligent Process Automation(IPA)
• Tactile VR
• Big Data Analytics
• Everything-as-a-Service(XaaS)
• Human Augmentation
• Cybersecurity
• Artificial Intelligence(AI)
For query : @geekcodevipbot
@geekcode
93 views17:30
2021-09-27 15:30:06
#CyberTalks #CyberAwareness
How to protect Systems from Ransomware?• Audit events and take inventory. Audit both event and incident logs to spot suspicious behavior. Take note of all assets and data. Identify authorized and unauthorized devices and programs.
• Configure and monitor. Manage hardware and software configurations. Only grant administrative privileges when necessary.
• Patch and update. Conduct regular vulnerability assessments and patching or virtual patching for operating systems and programs. Update software and applications.
• Protect systems and recover data. Administer data protection, backup, and recovery measures. Implement multifactor authentication (MFA).
• Secure and defend layers: Perform sandbox analysis to filter malicious emails. Employ security solutions to all layers of the system such as email, endpoint, web, and network.
• Train and test. Conduct regular training and security skills assessment for employees. Perform red-team exercises and penetration tests.@geekcode
93 views12:30