While the threat actors are improving on the campaign’s sophistication by building reputable-sounding content within the body of the email, cybersecurity awareness training for executives and businesses will help avoid…
Tag: Cyber Security
ArticlesProtection of Ghana’s critical information infrastructure in the cybersecurity act
By Richard Kafui0The recent wanton cyber-attacks on CIIs globally give cause to worry as a nation. It is extremely important for CII to cooperate with the Cyber Security Authority to safeguard the…
ArticlesChild Online Protection (COP) related provisions in the Cybersecurity Act, 2020 (2)
By Richard Kafui0Every child must be protected from violence, exploitation, and abuse on the internet – UNICEF Child Online Protection (COP) is a global challenge that needs urgent attention. Children today have…
ArticlesThe Offensive Approach to Ghana’s Voter Data Exposure
By Richard Kafui0A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
ArticlesThe Sherrif Security Indicator
By Richard Kafui0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
ArticlesSocial Engineering; The Greatest Catalyst for Successful Cyber Attacks
By Richard Kafui0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…
ArticlesThe CIO Diaries: Selecting the right combination of cyber-security products
By Richard Kafui0After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimizing the costs of cyber tools and…

