Every child must be protected from violence, exploitation, and abuse on the internet – UNICEF Child Online Protection (COP) is a global challenge that needs urgent attention. Children today have varied access to the internet through laptops, desktops, mobile phones, and tablets, with all types of information available to them.
A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication has not been completely verified, and the legal authority to publish this data is equally under discussion. The above stated
As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from the past few years have been very intriguing and insightful. The USI researches into the most critical security issues faced
Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According to Atkins and Huang (2013), SE is the exploitation of human psychological weaknesses by scammers to attack innocent individuals. SE
After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimizing the costs of cyber tools and projects you want to undertake so that you can maximize the budget. A lot of Chief Information (Security) Officers (CIOs/CISOs)
At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, Death Certificate and Will Certificate). Together with edited copy of my passport, I sent it to the invisible bank, after which I ignored them. Remember:
Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, and so the need to obtain authentic information cannot be over-emphasized. Since not all information out there is factual and correct, consumers of digital services must know who to follow in the cyberspace and where to search for the right information about coronavirus on digital platforms.
The workshop had three resource persons, who gave real life scenarios in their various fields of expertise, bringing the narrative to the barest understanding, in order for professionals and students in the ecosystem to realize the very essence and impact of data science and cyber security in today’s digitization agenda.
Technology is evolving really fast that noticing the ‘Next Big Thing’ can feel overwhelming. Just to refresh your memory, emerging technologies are technologies that are presently developing or will evolve in the next five or ten years, and which will considerably change the business and social world. From climate change
According to the Cybercrime Unit of the Criminal Investigation Department of the Ghana Police Service, Ghana lost over USD 105 million to cybercrime at the end of 2018. These figures are the official records from the nation’s elite unit fighting cybercrime. In the previous year (2017), Ghana lost a little over USD 69 million to cybercrime. These figures could be double compared to what have been reported. This is because most firms do not report breaches due to cyberattack for fear of losing their clients.
Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity, information security, cybercrime, and computer forensics are often perceived as identical, but they are not. Due to cultural and political
Introduction Cybercrime has kept pace with technology advancement but, security practitioners and law enforcement agencies are yet to catch up with the criminals. This article highlights the current cybercrime activities, discusses the motivations behind cybercrime, and outlines steps of reducing cybercrime risks. Cybercrime Activities The Council of Europe Convention on
Cybercrimes are a real threat and can be extremely inconvenient if you find yourself as a victim. That’s why it is important every citizen of Ghana must put in efforts to be aware of cyber threats throughout the year. This paper discusses the need for everyone to promote cybersecurity and
Institute of ICT Professionals Ghana (IIPGH) in collaboration with Institute of Cyber Security and Information Assurance (ICIA) organized a very engaging Cyber Security Awareness Workshop and career guidance workshop at the Kwame Nkrumah University of Science and Technology (KNUST), Kumasi on 11th April 2018. The well attended workshop made up