Signs of Phishing: How to Spot a Scam
Phishing A Phishing attack is a type of social engineering attack that malicious attackers often use to steal sensitive data such as login credentials, credit card information, etc. Phishing is…
Phishing A Phishing attack is a type of social engineering attack that malicious attackers often use to steal sensitive data such as login credentials, credit card information, etc. Phishing is…
Background According to Wikipedia, the generic meaning of the word ransom is the payment made to a captor for the release of a captive (person) or a valuable. This meaning…
Introduction In this technologically advanced era, clicking has become one of the most fundamental acts we perform. According to Wellnomics and Statista, the average computer user makes 600 clicks per…
National Cyber Security Awareness Month 2021 Introduction The Sherrif Security Indicator (TSSI) is an annual online survey that is organized to commemorate Cyber Security Awareness Month. TSSI researches the most…
National Cyber Security Awareness Month 2021 Our society, personal lives, business transactions, and critical infrastructures have become largely dependent on computer networks and information communication technology. Almost everything from our…
As cybercriminals are getting more and more complex, organizations and individuals need to stay ahead of the curve in securing data and information.
Many cyber security experts know tons about the specific ins and outs of security. They also know more general things about technology. The key to understanding cyber security is to know a lot about data systems and data networks. If you do not understand networking, how will you know if a system is vulnerable or not? You should start out by mastering a few different operating systems, learn how they function at the root level, and you will quickly understand how and why they fail.
Educational institutions must be interested in such initiatives to foster the needed discussions between industry and academia. As a capacity-building organization, IIPGH is always very much ready to engage stakeholders through such platforms to shape and impact policy.
Ghana’s Cybersecurity Act, 2020 (Act 1038) was passed by the Parliament of Ghana and assented by the President into law on December 29, 2020. It is made up of 100…
Whiles there is no guarantee of a fully protected IT infrastructure/network environment free from compromise, gaining visibility is a step in the right direction in your journey to ensuring that you have the right insights for decision-making and quick incident responses.