Amakiri Welekwe

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

One of the key questions to ponder when using Google Drive cloud storage is: are my files secure and private? We take a closer look at Google Drive security, and offer steps you can take to improve it.
By Amakiri Welekwe in Information Security on September 21, 2023
Hacking incidents are on the rise. Most go undetected long before the victim realizes what happened. Here are 10 clear signs you can use to tell if your phone or computer has been hacked.
By Amakiri Welekwe in Information Security on December 13, 2023
Surveillance capitalism is here with us. Here's is what you need to know about it, and what you can do to defend your privacy and online identity.  
By Amakiri Welekwe in VPN & Privacy on July 21, 2020
To fully understand VLSM, we need to know the fundamentals. This tutorial explains what a subnet mask, subnetting, and supernetting are and how to implement.
By Amakiri Welekwe in Net Admin on November 14, 2024
Learn how to use Cisco Discovery Protocol to gather useful information about neighbor devices and map out a network with our tutorial.
By Amakiri Welekwe in Net Admin on November 20, 2021
As smartphone in-app advertising and data monetization becomes pervasive, privacy concerns continue to grow. We provide ways you can use to tell if an app is spying on you, sharing your data with third parties, and what you can do to protect your privacy.
By Amakiri Welekwe in VPN & Privacy on April 16, 2022
We explain practical ways to deploy office VPNs to provide employees with secure remote access to office resources from home.
By Amakiri Welekwe in VPN & Privacy on November 21, 2024
Worried about the safety of Zoom? With so many people using Zoom meetings for work it's important to know how to keep your sensitive data safe. We explain the essential steps you can take to keep your Zoom meetings private and secure.
By Amakiri Welekwe in Information Security on March 15, 2022
Page 24 of 24