Author: Richard Amanfu

1 2 3 11 20 / 212 POSTS
The growing animus between Information Technology and Information Security

The growing animus between Information Technology and Information Security

Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Depar [...]
The Sherrif Security Indicator

The Sherrif Security Indicator

As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for [...]
Information Security Governance: the cornerstone of effective information protection

Information Security Governance: the cornerstone of effective information protection

Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activ [...]
Social Engineering; The Greatest Catalyst for Successful Cyber Attacks

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks

Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information i [...]
3 Areas Where We Must Harness the Transformative Power of Artificial Intelligence

3 Areas Where We Must Harness the Transformative Power of Artificial Intelligence

For most people, artificial intelligence (AI) is about robots; about some complex technology that is far away from them. This is true especially for p [...]
Making sense of the COVID Pandemic; Education Post-mortem

Making sense of the COVID Pandemic; Education Post-mortem

Reshaping Our Educational System; Prioritising STEM Education. COVID-19 is not the first global pandemic the world has faced in recent history, but [...]
The CIO Diaries: Selecting the right combination of cyber-security products

The CIO Diaries: Selecting the right combination of cyber-security products

After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimi [...]
Automation, COVID-19 and Jobs

Automation, COVID-19 and Jobs

In an incredibly competitive world where manufacturers and service providers scramble for customers, delivering quality products and services timeousl [...]
Why do emails go to Spam folder?

Why do emails go to Spam folder?

This is a question I addressed extensively in my new book titled: "Digital First: The step by step employment guide for Digital Citizens." Anything [...]
Barriers to Artificial Intelligence Adoption in Ghana

Barriers to Artificial Intelligence Adoption in Ghana

Artificial Intelligence (AI) offers opportunities for a developing country like Ghana to transform its economy.  AI can provide solutions in all secto [...]
University-Industry Relationship: Growth and Sustainability of Technology Hubs in The Ghanaian Entrepreneurial Ecosystem

University-Industry Relationship: Growth and Sustainability of Technology Hubs in The Ghanaian Entrepreneurial Ecosystem

The influx of technology hubs across the country has significantly inspired the youth to seek self-employment in the technology sector. The pursuit of [...]
Safely Re-opening borders through Enhanced Monitoring & Adherence Tracking of Incoming Travelers – A timely solution for West Africa, based on science, data and technology

Safely Re-opening borders through Enhanced Monitoring & Adherence Tracking of Incoming Travelers – A timely solution for West Africa, based on science, data and technology

Summary The COVID-19 pandemic has led to the shutting of borders in most countries across the world, in a bid to slow the spread of the virus. This [...]
Impact of Covid-19 On Fintech Trends and Consumer Behaviour

Impact of Covid-19 On Fintech Trends and Consumer Behaviour

Covid-19 on its initial start appeared to be a very distant disease in faraway Asia. From December 2019 to February 2020, nearly everyone outside of C [...]
Computing Basics Everyone Should know

Computing Basics Everyone Should know

Much of the technology in use today have been democratized so much so that availability, usage, and controls are no longer the privilege of the IT Dep [...]
Ghana Voters ID card Vulnerability

Ghana Voters ID card Vulnerability

Introduction In the past years, there have been several issues battling with the security of systems and networks. The Aadhaar card of India is a 12- [...]
The CIO Diaries: A Supply Chain-Wide BCP & Cyber-Resilience Program

The CIO Diaries: A Supply Chain-Wide BCP & Cyber-Resilience Program

As companies were forced online in recent times, most re-assessed their Business Continuity Plans (BCP) and Cyber-Resilience Programs to come to terms [...]
Using technology to improve remittance usage for sustainable development

Using technology to improve remittance usage for sustainable development

Ghanaians, living abroad transfer monies back home regularly to support their families and friends. These money transfers are mostly for consumption a [...]
Covid-19 Disruption: The need to move ICT centres from the community to the home

Covid-19 Disruption: The need to move ICT centres from the community to the home

Past and present governments have channeled some resources into establishing community and school Information and Communication Technology (ICT) cente [...]
1 2 3 11 20 / 212 POSTS