Tag: articles

1 2 3 6 20 / 109 POSTS
Digital Transformation (DT) on Warp Speed

Digital Transformation (DT) on Warp Speed

Prior to the outbreak of the coronavirus (COVID-19), the question about who is leading the Digital Transformation (DT) in an organization has usually [...]
Information Security Risk Assessments of Suppliers

Information Security Risk Assessments of Suppliers

Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide [...]
Unleash Spectrum Potential to Pave the Way to a Digital Ghana

Unleash Spectrum Potential to Pave the Way to a Digital Ghana

The internet has revolutionized our society at an unprecedented speed, with mobile a key tool supporting its rapid growth. [...]
The digital transformation journey with Edge Computing, 5G and SD-WAN

The digital transformation journey with Edge Computing, 5G and SD-WAN

The possibilities are enormous; however commercial viability of the business cases must be quickly validated to understand the ecosystem better. With [...]
What if the Corona Virus was a piece of software?

What if the Corona Virus was a piece of software?

We need to be well prepared for any future scenarios whether the viruses are natural, artificially created, or pieces of software. Humanity should beh [...]
Working in remote teams:  What you can learn from the ICT industry

Working in remote teams: What you can learn from the ICT industry

As the Agile way of working is not so much about being at the office but more about getting things done and produce a certain result, it can be a good [...]
Professionals in lockdown:  How to set up a good and safe workplace and ICT provisions at home

Professionals in lockdown: How to set up a good and safe workplace and ICT provisions at home

While many people already started working from home a few weeks ago, the current lockdown in Accra and Kumasi is now challenging all professionals li [...]
Necessity brings innovation: ICT can help to overcome Corona virus challenges and grab the opportunity to innovate.

Necessity brings innovation: ICT can help to overcome Corona virus challenges and grab the opportunity to innovate.

Your current sales, customer contacts, and supplies may be affected badly by the current situation as it has become difficult to have personal physica [...]
Scam-baiting Case study: The Scammer in the refugee camp (Part 2)

Scam-baiting Case study: The Scammer in the refugee camp (Part 2)

At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, D [...]
Outbreak of Coronavirus – a threat to Cybersecurity

Outbreak of Coronavirus – a threat to Cybersecurity

Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, a [...]
Scam-baiting Case study: The Scammer in the refugee camp (Part 1)

Scam-baiting Case study: The Scammer in the refugee camp (Part 1)

Scam baiting is a form of internet vigilantism, where the vigilante poses as a potential victim to the scammer in order to waste their time and resour [...]
Digital Literacy: an enabler to the successful implementation of the African Continental Free Trade Agreement (AfCFTA)

Digital Literacy: an enabler to the successful implementation of the African Continental Free Trade Agreement (AfCFTA)

We need to devise means of educating our retailers on enhancing their businesses with technology. For instance, equipping them with web browsing skill [...]
Facebook Will: What Will Happen To My Facebook Account After I Pass Away?

Facebook Will: What Will Happen To My Facebook Account After I Pass Away?

This particular post is about Facebook platform. That feature on Facebook is called “Memorialization“. In short, you are creating a Digital Will for y [...]
Latest WebApp Security Threats Part 2: How to Prevent Injection Attack

Latest WebApp Security Threats Part 2: How to Prevent Injection Attack

“With these tools [hacking tools] in your hand, you guys are powered to do anything but remember, with a gun in your hand, you can be security man, yo [...]
Latest WebApp Security Threats Part 1: How to Perform Injection Attack

Latest WebApp Security Threats Part 1: How to Perform Injection Attack

Injection attack in short, is trying to add (inject) a query (a test, a letter, a code, or anything imaginable) at the front end of a web application, [...]
Manage Your Privacy, Safeguard Your Personal Data

Manage Your Privacy, Safeguard Your Personal Data

The concept of privacy varies widely among countries, cultures and jurisdictions. It is shaped by public expectations and legal interpretations; as su [...]
Stay “Cyber Safe” As You Explore 2020!

Stay “Cyber Safe” As You Explore 2020!

Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked [...]
Christmas Is Here Again! – Stay “Cyber Safe” As You Enjoy

Christmas Is Here Again! – Stay “Cyber Safe” As You Enjoy

Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift c [...]
Laying the Foundation for the Digital Future; a Digital Perspective

Laying the Foundation for the Digital Future; a Digital Perspective

In identifying and developing the right use cases, analytics or the ‘right’ analytics plays a crucial role in giving insights that decision makers wil [...]
Digital Gender Inequality: Challenges and Proposed Actions (Part 3)

Digital Gender Inequality: Challenges and Proposed Actions (Part 3)

Internet companies must assist women to use the internet safely by providing training that helps in identifying online threats and providing tools for [...]
1 2 3 6 20 / 109 POSTS