In this third part of the series on Social Media security and privacy, I would like to further expose the reader to other unsuspecting pieces of information that attackers earnestly…
Category: Articles
 Articles
ArticlesSocial Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal – Part 2
By Richard Kafui0In the part two of this article, we take a look at the ways in which different types of information provided on social media sites are exploited by attackers. First…
 ArticlesBLOGCapacity BuildingIIPGH NewsWomen In Tech
ArticlesBLOGCapacity BuildingIIPGH NewsWomen In TechVodafone & IIPGH Organized ICT Career Coaching Workshop for OLA Girls SHS, Ho
By Richard Kafui0There’s a shortage of young people and in particular girls studying Science Technology Engineering and mathematics (STEM). Despite the growing demand for knowledge in STEM, college graduates with STEM degrees…
 Articles
ArticlesSocial Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal
By Richard Kafui0Social networking sites are online platforms that allow people to connect with each other and build interpersonal relations. It has become a vital part of our modern life and its…
Capacity Building in Changing ICT Environment
By Richard Kafui0Capacity building and skills development are integral to harnessing the transformative potentialof the ongoing development and increasing sophistication of information and communicationtechnologies (ICT). Over the last two decades, explosive worldwide…
IT Business Continuity
By Richard Kafui0Introduction Business Continuity (BC) is the capability of an organization to continue the delivery of products/services at acceptable predefined levels following disruptive incident [Source: ISO 22300]. BC is extremely important…
How to stay up to date in the fast-moving world of information technology
By Richard Kafui0It does not really matter who you are – an IT professional, a CTO hiring an IT-service manager, or a businessman looking for a contractor to build a key software…

