The recent wanton cyber-attacks on CIIs globally give cause to worry as a nation. It is extremely important for CII to cooperate with the Cyber Security Authority to safeguard the…
Tag: Cyber Security
ArticlesChild Online Protection (COP) related provisions in the Cybersecurity Act, 2020 (2)
By Richard Kafui0Every child must be protected from violence, exploitation, and abuse on the internet – UNICEF Child Online Protection (COP) is a global challenge that needs urgent attention. Children today have…
ArticlesThe Offensive Approach to Ghana’s Voter Data Exposure
By Richard Kafui0A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
ArticlesThe Sherrif Security Indicator
By Richard Kafui0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
ArticlesSocial Engineering; The Greatest Catalyst for Successful Cyber Attacks
By Richard Kafui0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…
ArticlesThe CIO Diaries: Selecting the right combination of cyber-security products
By Richard Kafui0After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimizing the costs of cyber tools and…
ArticlesScam-baiting Case study: The Scammer in the refugee camp (Part 2)
By Richard Kafui0At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, Death Certificate and Will Certificate).…

