Security 101: Your Data and External Threat


Security 101: Your Data and External Threat

Data which relate to you as an individual is valuable to you, other organisations and the bad guys. It doesn’t matter where this data is located or the format stored; if online, it becomes more vulnerable and constantly threatened by those who want to gain unauthorised access to it. These attacks often time comes from skilled and experienced hackers who try to circumvent system security to gain access then escalate privileges to retrieve whatever they want to and use it for whatever purpose they want.
The first step towards protecting your personal data from external threats is User Awareness. People are said to be the weakest link and can easily be tricked into releasing sensitive information that ought not to be. Therefore the user needs to be aware of these various means used in stealing information. For organisations, every employee has a role to play in securing organisation’s data not minding their role within the organisation. They all need security awareness
Data Classification: data need to be classified based on how sensitive they are to an individual or an organisation. Based on the sensitivity, access should be granted on a need-to-know basis. So that only employees with access right can access such data. More sensitive information such as financial information and/or credit card information should be stored encrypted according to Payment Card Industry Data Security Standards (PCIDSS). Policies, compliance controls and segregation of duties can be setup by the top management
Securing Network Perimeter: external threats to data are basically via the internet on networks. As long as an individual or organisation is connected to other networks, then that organisation is vulnerable to external threats. It doesn’t matter how secure you feel you are, “security is a process and not a state.” And therefore there is a need to constantly tighten up network defences. Firewall should be installed and properly configured to filter inbound and outbound traffic. Other network monitoring and intrusion prevention and detection tools can be installed.
And finally, having a Password Policy: It’s a lot easier to use easy to remember passwords, same password for different accounts and also vendor’s default passwords. This way one won’t have to struggle trying to remember what the password is. But these are easily guessable and crackable and therefore highly discouraged. It is recommended to use different mix of characters (upper, lower and special characters), different password for different online accounts and should be constantly be changed.
Want to keep external threat at bay? Make security a culture. 
Got comments? Send to article@managementedgeltd.com

Computer Based Training Tips

Computer based training (CBT) refers to the form of tutelage where learners are imbibed skills through the execution of specific study programs installed on a computer. This training is highly efficient in inculcating skills in the use of computer applications as a CBT program is typically integrated into it, allowing learners to use them as they practice new skills. This type of training requires a huge pool of resources owing to the complexity of crafting a relevant program and running it successfully. The rapid demand for PC computers and a surging prevalence of the devices incorporating CD-ROMs has popularized CBT in all corners of the globe.

Computer-based training is an ideal option for corporate entities and interested individuals as it provides a compendious training. The PC applications are also engineered with an inbuilt form of CBT referred to as a tutorial. However, CBT is available online as a self-customized and interactive system that all users can rely on. Such training platforms allow the users to establish aims while working at their own speed. The completion of a course is dependent on the subject in question. There are many courses online that you can choose from, quintessentially, they include basic, advanced technology alongside management skills.
Computer Based Training Tips in Nigeria
Computer Based Training in Nigeria

CBT online is highly convenient in contrast with school-based training. If you enroll for online training, chances are that you will be able to access training throughout and anywhere. The training provides course subjects online, they can be accessed through downloads or browsing. Downloadable programs are ultra-versatile as you can learn while offline. This approach allows users greater degrees of autonomy that can enable them to progress and attain skills faster. Computer based training has various tools that allow users to set aims and reminders. You are free to determine your learning philosophy and pace. You can also start and complete lessons at your own volition.

CBT courses are highly engaging and involve a lot of interactions. The learning materials are presented dynamically as to convey information through a slew of instructive models. Articles, quick tests, mentored exercises, regular self-assessments and simulations invitingly immerses the learner in training and allows full control of all the time spent utilizing CBT.  When you are in full control of your learning, chances of grasping the nitty-gritty of every lesson are higher than when a tutor has complete learning stewardship. It also allows you to learn from your own mistakes, improve on skills, identify strengths and weaknesses and comprehend concepts in your own ways.
Computer Training in Nigeria
Computer Training in Nigeria

Computer based training programs available online gives students the real picture. Modules are easier to follow on CBT, less time is spent in class and the courses can be taught expeditiously. Since the courses typically have self –assessment, it becomes easier for an individual to rate progress and mastery of content.


CBT is a feasible approach when you want to acquire convenient, autonomous and appropriate training without the need to attend lectures. Underpinned on the notion of self-education, the skills and knowledge imparted by this form of training is poised to infuse long-term understanding of the students.

Lean Six Sigma


Lean Six Sigma
Lean Six Sigma is a process improvement programme that combines two ideas: Lean - a collection of techniques for reducing the time needed to provide products or services, and Six Sigma -a collection of techniques for improving the quality of products and services, substantially contributing to increased customer satisfaction.

By combining the two, Lean Six Sigma is a proven business management strategy that helps organizations operate more efficiently. According to many business analysts and quality improvement experts, Lean Six Sigma is the most popular business performance methodology in the history of corporate development.

Why Get Certified?
·      Differentiate yourself
·      Demonstrate your commitment to ongoing education and professional standards
·      Increase your marketability
·      Promote best practice in your field

In the process improvement world, experience levels are characterized by colour - as in Martial Arts (e.g., Black Belt, Green Belt, Yellow Belt). These Belt labels have become the standard means of acknowledging responsibility and achievement. Management Edge has officially been accredited by PeopleCert to execute the training and exam for ALL these levels of Six Sigma.

Available Courses include: 
Yellow Belt: At an Advanced Beginner level, you are a knowledgeable contributor to Lean Six Sigma projects and management

Green Belt: At an Intermediate level, you are an essential member of the Lean Six Sigma project team.


Black Belt: At an Advanced level, you are an expert team leader, statistical analyst, and project manager - all rolled into one.

Introduction to COBIT 5

COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises. The principles, practices, analytical tools and models found in COBIT 5 embody thought leadership and guidance from business, IT and governance experts around the world.

COBIT 5 helps enterprises of all sizes:
  • ·      Maintain high-quality information to support business decisions
  • ·      Achieve strategic goals and realize business benefits through the effective and innovative use of IT
  • ·      Achieve operational excellence through reliable, efficient application of technology
  • ·      Maintain IT-related risk at an acceptable level
  • ·      Optimize the cost of IT services and technology
  • ·      Support compliance with relevant laws, regulations, contractual agreements and policies


An Introduction to COBIT Video is Below:



ISACA’s COBIT training courses provide valuable, timely education on COBIT 5 frameworks, These include:


COBIT 5 Foundation

Delve into the essential components of COBIT 5 to learn how it covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.
Participants will learn more about:
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • How to apply COBIT in a practical situation

COBIT 5 Implementation

Get a practical appreciation of how to apply the COBIT 5 Implementation Guide to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn to apply COBIT 5 into your enterprise and to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use the COBIT 5 continual improvement lifecycle approach for different organizational scenarios.
Participants will learn more about:
  • How to effectively analyze enterprise drivers
  • Implementation challenges, their root causes and success factors
  • How avoid potential implementation pitfalls by leveraging good practices

COBIT 5 Assessor Course

The COBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Reference Model (PRM). Evidence-based to enable a reliable, consistent and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives.
Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting and organizational compliance.
Participants will learn more about:
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • How to identify and assess the roles and responsibilities in the process capability assessment process

Some Insight about The Open Group's TOGAF



Enterprise architecture (EA) is a discipline for proactively and holistically leading enterprise responses to disruptive forces by identifying and analyzing the execution of change toward desired business vision and outcomes. Today's CEOs know that the effective management and exploitation of information through IT is a key factor to business success, and an indispensable means to achieve competitive advantage. Enterprise architecture addresses this need, by providing a strategic context for the evolution of the IT system in response to the constantly changing needs of the business environment.

Based on The Open Group Architecture Framework (TOGAF) the advantages that result from a good enterprise architecture bring important business benefits, which are clearly visible in the net profit or loss of a company or organization:
  •    A more efficient business operation:
    •  Lower business operation costs
    •  More agile organization
    •  Business capabilities shared across the organization
  •  A more efficient IT operation:
    •   Lower software development, support, and maintenance costs
    •  Improved interoperability and easier system and network management
  • ·      Better return on existing investment, reduced risk for future investment:
    •  Reduced complexity in the business and IT
    •  Maximum return on investment in existing business and IT infrastructure
  • ·      Faster, simpler, and cheaper procurement:
    • Buying decisions are simpler, because the information governing procurement is readily available in a coherent plan
    • The procurement process is faster - maximizing procurement speed and flexibility without sacrificing architectural coherence
Why do I need TOGAF as a framework for enterprise architecture?
TOGAF has been developed through the collaborative efforts of over 300 Architecture Forum member companies from some of the world's leading companies and organizations. Using TOGAF results in enterprise architecture that is consistent, reflects the needs of stakeholders, employs best practice, and gives due consideration both to current requirements and the perceived future needs of the business.

Developing and sustaining an enterprise architecture is a technically complex process which involves many stakeholders and decision processes in the organization. TOGAF plays an important role in standardizing and de-risks the architecture development process. TOGAF provides a best practice framework for adding value, and enables the organization to build workable and economic solutions which address their business issues and needs.

 Who would benefit from using TOGAF?
Any organization undertaking, or planning to undertake, the development and implementation of enterprise architecture for the support of business transformation will benefit from use of TOGAF.

Organizations seeking Boundaryless Information Flow can use TOGAF to define and implement the structures and processes to enable access to integrated information within and between enterprises.

Organizations that design and implement enterprise architectures using TOGAF are assured of a design and a procurement specification that can facilitate an open systems implementation, thus enabling the benefits of open systems with reduced risk.

The TOGAF Certification Program has enabled more than 25,000 enterprise architects and trainers around the globe to demonstrate their proven knowledge of the framework.

The Open Group TOGAF 9 certification is:
  •  Used by the world’s leading enterprises to certify a common body of core knowledge about the methodology and framework
  •  A trusted, vendor-neutral, globally recognized and portable credential
  •  Valuable in demonstrating to employers and peers your commitment to enterprise architecture as a discipline
  •  An outstanding career move and a foundational certification in the career of any enterprise architect

 TOGAF 9 Professional Certification takes two forms:
  • TOGAF 9 Foundation. This provides validation that the candidate has gained knowledge of the terminology and basic concepts of TOGAF 9 and understands the core principles of Enterprise Architecture and TOGAF
  •  TOGAF 9 Certified. This certification provides validation that in addition to knowledge and comprehension, the candidate is able to analyze and apply knowledge of TOGAF

Certification is achieved through a two-part exam, following a course of self-study or an Accredited TOGAF 9 Training Course. Additionally, a TOGAF 9 Combined exam option is available that contains material from both part 1 and part 2. The current syllabus is based on the TOGAF 9.1 standard since December 2011.



Accredited by PEOPLECERT

Management Edge has been Accredited by PeopleCert as an IASSC examination center.

Why is this news?
Well, I’m glad you asked!
PEOPLECERT is today one of the leading players in the global certification industry, partnering with multi-national organisations and government bodies for the development & management of globally recognised certification schemes and the delivery of their related standardized exams.
PEOPLECERT today maintains certification programmes on behalf of a wide range of organisations, including the ECDL Foundation, City & GuildsAXELOS (joint venture between the UK Cabinet Office and Capita plc.) for the Global Best Practice portfolio (including ITIL® and PRINCE2®) and others.
PEOPLECERT has also developed qualifications for Management Systems Professionals (including ISO 9001, ISO 20000 and ISO 27000), Accessibility certifications for the hospitality industry and Professional Valuers certifications (recognised by TEGoVA, The European Group of Valuers' Associations).
For the development & management of the certification schemes, PEOPLECERT has:
  • Innovative exam administration solutions that offer a hassle free and secure exam process for its partners, from exam development booking & registration, to exam delivery and certificate issue.
  • A suite of online services for a simple and user friendly candidate exam experience, including online proctored exams, online exam booking and payment, e-certificates and online certificate verification.

PEOPLECERT Highlights
  • Millions exams delivered across over 135 countries
  • Over 10,000 examination locations worldwide
  • A network of over 1,000 subject matter experts, associates and invigilators
  • Online & paper-based exams in 24 languages
  • Award winning online proctoring solution (received the Innovation award at the Business IT Excellence Awards)
  • 24/7/365 multi-lingual customer support through toll free numbers, e-mail and chat
  • ISO 17024 Accredited as a Personnel Certification Body by the Hellenic Accreditation Body (E.S.Y.D) (since 2006)
  • Certified for ISO 9001, ISO 10002, ISO 14001, ISO 27001, ISO 23988 - ensuring quality, security and integrity.
  • Certified by the National Organisation for the Certification of Qualifications and Vocational Guidance of Greece (since 2006)
  • Awarded with the “Committed to Excellence” distinction from the European Foundation of Quality Management (EFQM)
  • Member of the International Personnel Certification Association (IPC)
  • Member of the Association of Test Publishers (ATP)
  • Member of the European Group of Valuers’ Associations (TEGoVA)


YES! YOU THOUGHT RIGHT, MANAGEMENT EDGE HAS FOUND ANOTHER WAY TO ENSURE YOU GET THE VERY BEST IN SERVICES. STAY TUNED.

What will you get from ITIL Training in Abuja Nigeria

Today, every business needs better strategies to compete with others. They apply better marketing strategies to improve their market in at the global level, but do you know what actually helps a business for its success at world level? It is that business’s IT service management strategies, which lead that business towards its goal of success. By the way, do you know that how can you become an expert on aligning IT services of any organization with its needs? You can become an expert of alignment of IT service management with the organization’s need only if you will get ITIL certified. This is why many people are now joining ITIL training in Abuja, Nigeria to become an expert on this field.

What facilities are provided for ITIL training in Abuja?
There are any IT professionals, who want to become an ITIL professional so that they can drive client oriented services. Well, ITIL training in Abuja makes you capable of it. It does not take too much time in learning that how to manage IT sector of any business to deliver the best. However, it is important that you will get the support of expert faculties, who have enough knowledge of this field. ITIL training in Abuja is completed with the help of intelligent faculties, who have already established good position in this field.
ITIL training in Abuja
ITIL training in Abuja
What will be the training process?
Well, the training process of ITIL training in Abuja, Nigeria includes three different levels. In the initial level you learn that what ITIL services are and how you can utilize it to meet all needs of an organization. At initial level trainers train you about the terminology and methodologies of ITIL. At the intermediate level you find many educational courses of ITIL services. You need to decide that with which course you want to complete your certificate. This level is divided into two different fields, first one is service life cycle and another one is service capability.

Final level of ITIL training in Abuja:
When you come to the final level of ITIL training, it is called the expert level. At this level the trainees learn about whole needs of ITIL services in the market. They learn how to employ their ITIL skills for understanding and delivering the IT service management needs of any firm. Whole basics of IT infrastructure library are explained to the candidates in a detailed way. At this level, candidates are allowed to select their choice’s process in which they can make their career. Everything is explained in modular form and if you join the ITIL training in Abuja, you can get better benefits of this whole training process.

IT infrastructure library training can be very beneficial for you, if you will complete it from a certified institution. This is not sure that how much you will get paid for your services, but it is sure that you will get a great career in your future. Today many people are joining ITIL training and they are making their career bright in IT field.