Joseph Ochieng

Joseph Ochieng’was born and raised in Kisumu, Kenya. He studied civil engineering as first degree and later on pursued bachelors in information technology from the technical university of Kenya. His educational background has given him the broad base from which to approach topics such as cybersecurity, civil and structural engineering. When he is not reading or writing about the various loopholes in cyber defense, the he is probably doing structural design or watching la Casa de Papel . You can connect with Joseph via twitter @engodundo or email him via josephodundoh@gmail.com for email about new article releases”
Biometrics and Cybersecurity

Biometrics and Cybersecurity

Biometrics cybersecurity is important since Biometrics is a standard for authentication to help keep organizations and companies secure.

What Cybercriminals do to Make Money (Top 9)

What Cybercriminals do to Make Money (Top 9)

What Cybercriminals do to make money? We examine the lucrative methods that hackers use to fatten their wallets by taking...

How Cybercriminals Plan Attacks (5 steps)

How Cybercriminals Plan Attacks (5 steps)

How Cybercriminals Plan Attacks is they use specific methods and tools to plan attacks. We explain what methods are and what processes are...

What do Virtually all Phishing Emails have in Common? (5 Things)

What do Virtually all Phishing Emails have in Common? (5 Things)

What do Virtually all Phishing Emails have in Common? We outline what virtually all phishing emails have in common so that you can easlily...

How does email get hacked? (7 easy ways)

How does email get hacked? (7 easy ways)

How does email get hacked? We explain how cyber criminals can easliy access email accounts and what you can do to stop them.

Security Awareness During the Covid-19 Crisis

Security Awareness During the Covid-19 Crisis

Covid-19 is shocking the world. Hackers are taking advantage of this. We examine the methods these hackers are using what to do to stop them.

Automation and Integration in Cybersecurity

Automation and Integration in Cybersecurity

Why 5G Requires New Approaches to Cybersecurity

Why 5G Requires New Approaches to Cybersecurity

Incident Response – A Complete Guide

Incident Response – A Complete Guide

Incident Response is critical for any organization for the protection of data, systems, and networks. We provide a complete overview of IR and...

Ethical Hacking – A Complete Guide

Ethical Hacking – A Complete Guide

Ethical hacking is an incredible career that is of vital importance. We provide a complete overview of what ethical hacking is and how it works.

Virtualization Security – A Complete Guide

Virtualization Security – A Complete Guide

We look at differences, issues, challenges, and risks caused by virtualization. We also provide recommendations to ensure security...

Cyber Threat Hunting – A Complete Guide

Cyber Threat Hunting – A Complete Guide

11 Critical Items for a Network Security Policy

11 Critical Items for a Network Security Policy

We outline everything you need to know to implement a network security policy for your organization. This complete guide will ensure your...

IT Auditing – Planning the IT Audit

IT Auditing – Planning the IT Audit

A comprehensive guide to planning an IT audit for your organization. Cybersecurity Audits are required to ensure that your network and systems...

Computer Forensics – 7 Critical Processes

Computer Forensics – 7 Critical Processes

This is a complete mini-course on Computer Forensics. Learn how to react, gather evidence, preserve evidence, and ensure that the evidence will stand up.

Cyber Threat Analysis – A Complete Guide

Cyber Threat Analysis – A Complete Guide

Everything you need to know about Cyber Threat Analysis, Methodologies, Processes, Attack Vectors and more. CyberExperts provides a complete overview.