A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
Tag: Cyber Security
 Articles
ArticlesThe Sherrif Security Indicator
By Richard Kafui0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
 Articles
ArticlesSocial Engineering; The Greatest Catalyst for Successful Cyber Attacks
By Richard Kafui0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…
 Articles
ArticlesThe CIO Diaries: Selecting the right combination of cyber-security products
By Richard Kafui0After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimizing the costs of cyber tools and…
 Articles
ArticlesScam-baiting Case study: The Scammer in the refugee camp (Part 2)
By Richard Kafui0At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, Death Certificate and Will Certificate).…
 Articles
ArticlesOutbreak of Coronavirus - a threat to Cybersecurity
By Richard Kafui0Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, and so the need to obtain authentic information cannot…
 IIPGH News
IIPGH NewsInstitute of ICT Professionals Ghana (IIPGH) Organizes Data Science and Cyber Security Workshop
By Richard Kafui0The workshop had three resource persons, who gave real life scenarios in their various fields of expertise, bringing the narrative to the barest understanding, in order for professionals and students…

