BwB
Join CommunityBwB Fundamentals
  • 🏠WELCOME TO
  • Join community
    • Join Community
    • Page 1
  • BwB
    • 🏡Community
      • How to join BwB
      • What to expect from BwB
      • What you stand to gain
    • S7x: Crypto Inheritance
    • S7x: Freedom to own & use, & compliance & regulations
    • S121: Why are you online?
    • S120: Human Intelligence
    • S119: Bitcoin Reminisce
    • S118: How Broke is too Broke
  • BWB_Circles
    • Plan Ahead
    • 6th Cycle
      • S117: Banking without Identity?
      • S116: Did you buy the dip?
      • S115: Digital Right
      • S114: The State of Affairs
      • S113: Welcome to bear market
      • S112: ponzi scheme
      • S111: The battle for control
      • S110: Life of a trader
      • S109: falsification in the era of bitcoin?
      • S108: crypto and politics?
      • S107: The fraud among us?
      • S106: What's next?
    • 5th Cycle
      • S105: Portfolio Review
      • S104: KYC vs KYV
      • S103: Privacy Token
      • S102: Web3 based christmas gift
      • S101: Narratives in crypto today
      • S100: Purchasing with Bitcoin
      • S99: Government & USDT
      • S98: BTC to $100k
      • S97: Importance of written agreement
      • S96: Connected but independent
      • S95: What'z changing
      • S94: Black Money
      • S93: Living in the Virtual world
      • S92: Bitcoin goes to school
      • S91: Celebrity scam token
      • S90: Bitcoin in Church
      • S89: Web3 and Gig Economy
      • S88: Making Proper Plans
      • S87: Don't be Greedy
      • S86: Job Hackers
      • S85: 5th Cycle & Community Expectations
    • 4th Cycle
      • S84: 21ON21
      • S83: The web of protest
      • S82: Crypto-lite
      • S81: Longevity
      • S80: Crypto sizzle trust
      • S79: BullRun is Over
      • S78: Capitulation
      • S77: cNGN
      • S76: Volatility
      • S75: Why the bank is better than crypto
      • S74: Let's go a fishing
      • S73: How to use Bitcoin (Bitcoin pizza day case study)
      • S72: Crypto Losses
      • S71: matter getting serious
      • S70: Unauthorized Access
      • S69: Custodianship | The Bank
      • S68: Bitcoin Halving
      • S67: Digital Economy
      • S66: FAQs | AMA
      • S65: your Game Plan
      • S64: Global Citizenship
    • 3rd Cycle
      • S63: 21 on 21
      • S62: The Future with AI
      • S61: Fear, Greed & Fomo
      • S60: Treasure in Airdrop
      • S59: flow with the rally
      • S58: Your way out of legacy market/system
      • S57; Journey in crypto!
      • S56: Duel it - Bitcoin or Ethereum
      • S55: Tactics of investment
      • S54: Bitcoin ETF approved, then what?
      • S53: 2024 expectations
      • S52: Black Market
      • S51: The era of AI, Big Data and Robotics
      • S50; Banter the Rally
      • S49: Bitcoin is not an investment
      • S48: Taking loans
      • S47: Gambling seduction
      • S46; The technology will be used to catch you
      • S45: The Bull is here
      • S44: not a get rich quick scheme
      • S43; Card Fraud
    • 2nd Circle
      • S42: 21 on 21 B
      • S42: 21 on 21
      • S41: Hyperbitcoinization & the man that saw it live
      • S40: Bitcoin; Beast of no nation
      • S39: African arising
      • S38: The democracy of financial services
      • S37: is web3 a deception?
      • S36: The Innovation of WorldCoin
      • S35: Digital footprint & cyber Hygiene
      • S34: $1 to N1000, May or Mar
      • S33: $1 to N1000, May or Mar
      • S32: AI & Crypto; Money, Investment & Jobs
      • S31: Bitcoin ETF & What it means to you
      • S30: step-by-step process of starting to invest in crypto
      • S29: Bull Mark3t expectation
      • S28: Data Protection Bill & Floating Exchange Rate
      • S27: SEC Crackdown on Exchanges; is your money safe?
      • S26: Filling the subsidy gap with technology
      • S25: why Bitcoin, why not?
      • S24: meme token: the harder they fall!
      • S23: AMA on Breakfast with Blockchain
      • S22: Technology & Real Estate
    • 1st Circle
      • S21: 21 on 21
      • S20: will technology take your job away?
      • S19: BRICS are coming
      • S18: Making Money with Crypto or Forex
      • S17: Doing Due Diligence on the web
      • S16: Web 3
      • S15: SCAMMERS
      • S14: NFTs Cont'd
      • S13: NFT
      • S12: Naira first & what next with NFT
      • S11: Portfolio creation/review
  • Glossary
    • Indexing
      • Bitcoin Halving
      • Sharpe Ratio
      • Sortino Ratio
      • Ordinals
      • Security with Web3
      • Survey
    • As a Guest
      • Investment Saga
      • 38 ways to make money in crypto
Powered by GitBook
On this page
  • Matter getting serious
  • Remember the rules
  • At the end of today's series, we must have been able to
  • Welcome to Breakfast w/ Blockchain
  • Let's get started
  • The state of P2P in Nigeria
  • Cybersecurity levy 0.5%
  • What can you do when you are exposed to unauthorised access
  • What can you do to be safe
  • Comrade of the week
  • Conclusion
  1. BWB_Circles
  2. 4th Cycle

S71: matter getting serious

11-May-2024 | Fireside Chat (Ep 7)

This is Sirflex speaking, Your Host! GM everybody, i officially welcome you today's space.

Fireside Chat (EP 7)

the opening price of bitcoin today is $62,875.49, with a total trading volume of $32.81Bn

Let's do something quick, tag a comrade in the comment section, use the #bwbseries and wish them happy weekend.

Icebreaker

Do you know that there are force that hold you down in this world that wont allow you to fly high. and it is not your village people, it is called gravity. try to jump and see how it pulls you down back. the problem is many of you are not praying against. my question is why?

In today's series, I have one poll & one question for you.

// POLL QUESTION
If you can switc to another peroson for 24 hours, who will you like to play? 
1. Elon Musk 
2. Satoshi Nakamoto  
3. President Tinubu 
4. Adolf Hitler 
// QUESTION (ENGAGING)
what did you see in the message that you received that made you know its a scam? 

Matter getting serious

Imagine you worked hard for the past 30 days, you get paid your salary, or imagine you are doing a business, you made high value sales. or you converted an HNI (High Net-worth Individual), or you are even a student, and you have been asking your uncle, aunt, mom, dad for pocket money. then all of a sudden they all send to urgent 2k the same day.

then one day, all of a sudden, you got an alert, and all the money you have in the account is gone.

all the joy you feel when you have money can be chartered if you allow unauthorised access to your account?

the truth is no one person want to give someone else unauthorised access, the big question is how do they then gain access to your account?

!! How do you give unauthorised access to scammers?

Remember the rules

  1. Engage the polls, engage the comment section, and show reactions so we can all have a wonderful experience today.

  2. Today's series is sponsored by ADEWALEFLEX,

At the end of today's series, we must have been able to

  1. The state of P2P in Nigeria and the way forward

  2. introduction of cybersecurity levy and its impact

  3. What you can do to save yourself

Welcome to Breakfast w/ Blockchain

Welcome to Breakfast with Blockchain, Here, we talk about Web3, Innovation, our environment and recent development. this Saturday and every other Saturday at 10 a.m, we gather here to chat. Join our WhatsApp for discussion and Connect with us on twitter in our twitter community. and let's grow together.

Let's get started!" 💡🚀 #BreakfastWithBlockchain

Let's get started

The state of P2P in Nigeria

Cybersecurity levy 0.5%

Today the inclusion of cybersecurity levy fee has sky

  1. what is cybersecurity levy and why is it important

  2. What is the impact of this on you sending or receiving money

  3. statistics of things as of today

What can you do when you are exposed to unauthorised access

  1. Change Your Password: Immediately change the password for the affected account. If you're unable to log in, use the account recovery options provided by the service.

  2. Check Account Details: Review all account details and settings for any changes made by the unauthorized party, such as the email address, phone number, and security questions.

  3. Update Security Settings: Enable or strengthen security settings like two-factor authentication if you haven’t already.

  4. Notify the Service Provider: Contact the company or service provider for the affected account. They can help secure your account and track any unauthorized activity.

  5. Check for Breaches on Other Accounts: If you use the same or similar passwords on other accounts, change those immediately.

  6. Monitor Your Accounts: Keep an eye on your account statements and logs for any unusual activity that may occur after the breach.

  7. Report Identity Theft (if applicable): If there is evidence that your personal information is being misused, report it to the relevant authorities and consider measures to protect your identity, such as credit freezes.

  8. Use Security Software: Run a security scan on your devices to check for malware or viruses that might be capturing your information.

What can you do to be safe

  1. Use Strong Passwords: Ensure your passwords are complex, long (at least 12 characters), and unique. Include a mix of upper and lower case letters, numbers, and special characters.

  2. Enable Two-Factor Authentication (2FA): Always enable 2FA where possible. This adds an extra layer of security by requiring a second form of identification beyond just your password.

  3. Update Regularly: Keep your software, apps, and devices updated. Updates often include security patches that protect against new vulnerabilities.

  4. Use Secure Networks: Avoid using public Wi-Fi for accessing sensitive accounts. If you need to use public Wi-Fi, consider using a virtual private network (VPN) to secure your connection.

  5. Be Wary of Phishing Attempts: Be cautious with emails or messages requesting your account details. Always verify the authenticity of any request for sensitive information.

  6. Limit Sharing of Sensitive Information: Be mindful of the personal information you share online and whom you share it with.

  7. Use Security Software: Install and maintain security software, such as antivirus and anti-malware programs, to help detect and prevent malicious attacks.

  8. Monitor Account Activity: Regularly check your account activity for any unauthorized access or suspicious behavior. Many services offer alert features that notify you of unusual activity.

Comrade of the week

Regularly review account activities for unusual signs and employ security software to detect threats. These proactive steps significantly enhance your data security, keeping your digital life protected.

Conclusion

You have a digital life financially and value wise, always review your account activities for unusual signs and employ security software to detect threats. The power anyone have over you is the ability of you to accept them, don't be coerced or cajoled or scared to stay in control of what you can control. always question everything.

If you don’t believe me or don’t get it, I do not have the time to try to convince you, sorry! -Satoshi Nakamoto (July 2010) Price of bitcoin: $0.08

PreviousS72: Crypto LossesNextS70: Unauthorized Access

Last updated 1 year ago