Think Before You Click: The cyber-safety rule
Introduction In this technologically advanced era, clicking has become one of the most fundamental acts we perform. According to Wellnomics and Statista, the average computer user makes 600 clicks per…
Introduction In this technologically advanced era, clicking has become one of the most fundamental acts we perform. According to Wellnomics and Statista, the average computer user makes 600 clicks per…
National Cyber Security Awareness Month 2021 Introduction The Sherrif Security Indicator (TSSI) is an annual online survey that is organized to commemorate Cyber Security Awareness Month. TSSI researches the most…
National Cyber Security Awareness Month 2021 Our society, personal lives, business transactions, and critical infrastructures have become largely dependent on computer networks and information communication technology. Almost everything from our…
As cybercriminals are getting more and more complex, organizations and individuals need to stay ahead of the curve in securing data and information.
Many cyber security experts know tons about the specific ins and outs of security. They also know more general things about technology. The key to understanding cyber security is to know a lot about data systems and data networks. If you do not understand networking, how will you know if a system is vulnerable or not? You should start out by mastering a few different operating systems, learn how they function at the root level, and you will quickly understand how and why they fail.
Educational institutions must be interested in such initiatives to foster the needed discussions between industry and academia. As a capacity-building organization, IIPGH is always very much ready to engage stakeholders through such platforms to shape and impact policy.
Ghana’s Cybersecurity Act, 2020 (Act 1038) was passed by the Parliament of Ghana and assented by the President into law on December 29, 2020. It is made up of 100…
Whiles there is no guarantee of a fully protected IT infrastructure/network environment free from compromise, gaining visibility is a step in the right direction in your journey to ensuring that you have the right insights for decision-making and quick incident responses.
Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked for personal details which can be used for fraudulent purposes.
Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift cards that appear to be sent from your phone contacts. Following the link will take you through to another site that looks genuine and would be requesting your personal details.