Nasir, has just received an email claiming to be from his boss, asking him to drop the current case they were investigating with good leads and take a break . He is confused because the email address is just the same as his boss.
Dolapo is very careful about whom she shares information with on social media. She has, also attracted unwanted interest from the security services, based on what she posts and has received countless failed login attempts to her Facebook account. Here's how you can prevent this from happening to you.
Chidinma has been tweeting about the awareness campaign but she noticed an offensive tweet from her account that she didn't create. She becomes worried as she had ignored Nasir's advice to use 2 Step Verification for her account.
Whenever Nasir is hanging out with his friends, he posts a lot of photographs and checks in from different places they visit.His friends tell him to be careful about sharing too much sensitive information. He realises they're right, and now wants to find out the best way to manage his social media settings.
Chidinma got a Friend request on Facebook posing to be a sponsor she had be following up on. She doesn't get too excited but pauses to review the profile of the sponsor before accepting.Turns out to be Fake.
There's an ongoing renovation at the office, but Nasir has got to work. He finds himself floating from one Internet cafe to the other everyday to avoid establishing a routine. He also doesn't want anyone to track his activity, either, so he wipes his browsing history from all public computers he uses. Here's how he does it.
Dolapo runs out of mobile data whilst waiting for her flight to Abuja where she holds a Campaign against "Girl Trafficking". She has to share a list of possible sponsors with her secretary. She connects to the airport wi-fi which is fictitious and now her communication has been intercepted.
Nasir and Dolapo are working together to track the activities of AGA on social media. They need to build up a case so law enforcement agencies can clamp down on AGA. How do they go about this, without contravening the Nigerian Cybercrime Act 2015