Skip to main content

Your Old Phone Number Could Be Someone's New Number

You may have lost your mobile device, and for some reason could not retrieve your old phone number. It is important to note that after a long period of time you service provider could reassign the number to someone else, therefore there is need to update your online contact details accordingly.


What this means is you need to ensure your old mobile number is no longer linked to any of your online accounts and platforms. You can achieve this by updating your personal and contact information on all online platforms where you may have registered the old number, such as your bank accounts, Google account, Apple account, etc. For bank accounts kindly contact the customer service via phone call, visit their verified website or walk into nearby branch to update your details with your new number.

Failure to effect these contact updates could lead to issues such as inability to receive One Time Password (OTP) notifications, SMS alerts and so on. These notifications would be received by the new owner of your old mobile line, which potentially puts you in danger of being hacked.







Comments

Popular posts from this blog

WEB SERVER AND BROWSER INTERACTION

At one time or the other, you may have used or heard such expressions as “Downloading file from server”, “server is slow”, “Authentication required for server access”, and so on. These are everyday expressions used in the present Information Age. Now let us take a closer look at what a server really is, with emphasis on the type of server that makes it possible for access to the Information Superhighway – the Internet, known as Web Servers , as well as what actually happens when an internet user tries to access a website via a Web Browser by sending a (Hyper-Text Transfer Protocol) HTTP request to the web server. WHAT IS A SERVER? A server is basically a computer program that serves some sort of content to a client using a specified protocol. The term server also refers to the computer or virtual machine running the server program, which in fact is the most common use and understanding of the term. Today, most enterprise organisations with computer network infrastructure do host th

INTERNET PENETRATION - Nigeria Top Three in Global Online Search

Over the years Internet penetration has greatly improved across the developing countries of the world especially Nigeria which now has over 92 million internet users. Finding information online has become a common practice as people comfortably search for information using web search engines, especially Google  and get relevant search results that answers their questions and further provides them insight to related articles, events, photos, news and even map locations. Thanks to Google Map Local Guides like myself who diligently contribute to improve the map by sharing knowledge of the local environment. The mobile internet revolution has made it possible for people even in the rural areas to have access to internet on their mobile devices. During my University days, precisely in the year 2008, I carried out a questionnaire research on the topic: "How Effectively Do You Utilize Your Mobile Phones For Internet Access", the responses were amazing as people were alrea

MOBILE NETWORK PORTABILITY (MNP) COMING SOON IN NIGERIA

What is Mobile Network Portability (MNP)? Mobile Number  Portability allows mobile telephone users to migrate from one service provider to another and still retain their telephone numbers. It provides a platform whereby a subscriber on any of the existing GSM and some of the CDMA networks can switch from one service provider to another and still retain their phone numbers. For instance, with your current MTN line you can decide to migrate to ETISALAT or vice-versa, and still retain your "stable and popular" phone number. How MNP Works For instance, subscriber A whose original service provider is network P, might wish to change or port to network Q. This can be achieved by subscriber A sending a porting request to network Q, network Q sees the request coming from a user on network P and then contacts them accordingly to setup the process of exchange and transference of subscriber details, this is the most common and it is known as "Recipient-led" porting. Once a