As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
Tag: Cyber Security

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks
By Richard Kafui0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…

The CIO Diaries: Selecting the right combination of cyber-security products
By Richard Kafui0After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimizing the costs of cyber tools and…

Scam-baiting Case study: The Scammer in the refugee camp (Part 2)
By Richard Kafui0At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, Death Certificate and Will Certificate).…

Outbreak of Coronavirus - a threat to Cybersecurity
By Richard Kafui0Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, and so the need to obtain authentic information cannot…

Institute of ICT Professionals Ghana (IIPGH) Organizes Data Science and Cyber Security Workshop
By Richard Kafui0The workshop had three resource persons, who gave real life scenarios in their various fields of expertise, bringing the narrative to the barest understanding, in order for professionals and students…

HP Partners with ExpressVPN to protect laptop users from unsecured Wi-Fi networks
By Richard Kafui0Technology is evolving really fast that noticing the ‘Next Big Thing’ can feel overwhelming. Just to refresh your memory, emerging technologies are technologies that are presently developing or will evolve…