Skip to content
Search for:
Professional Bodies License No.: PB 94
INSTITUTE OF ICT PROFESSIONALS GHANA
CONTACT USinfo@iipgh.org
AddressOKSART Place, 2nd Floor, Ring Road Central – Circle
DONATE
  • Home
  • About Us
    • OUR INSTITUTE
    • Institute Structure
  • Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • ACADEMY
    • Coding Education for Ghana Program
      • The Coding Program
      • The Coding Caravan
      • Digital Design and Creative Coding
    • Downloads
      • Coding Brochure
      • Coding Program FAQ
      • Coding Caravan brochure
  • Media & Gallery
    Gallery
    Articles
    OUR VIDEOS
    PUBLIC AWARENESS
    OUR EVENT
    NEWS FEED
    Gallery
    gallery15
    confslide4
    confslide13
    gallery8
    gallery1
    Object
    gallery2
    Object
    VIEW MORE
  • Services
    • Consulting Service
    • Public Education / Capacity Building
      • Cyber Security Awareness
      • Tech Entrepreneurs Forum
      • Tech Job Fair
      • Industry Academia Tech Dialogue
      • The Coding Caravan
      • National Teaching Council
      • Women In Tech
        • Women Led Program
  • Contacts Us
Search for:
Social engineering
Homepage
/
Social engineering

Tag: Social engineering

Social Engineering as A Business RiskArticles

Social Engineering as A Business Risk

17 October, 2021
By Richard Kafui0articles, Cyber Security, Cyber security awareness month, Kafui Amanfu, Social engineering

While the threat actors are improving on the campaign’s sophistication by building reputable-sounding content within the body of the email, cybersecurity awareness training for executives and businesses will help avoid…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Social Engineering; The Greatest Catalyst for Successful Cyber AttacksArticles

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks

02 October, 2020
By Richard Kafui0articles, Cyber Security, cyber-attacks, Sherrif Issah, Social engineering

Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
BEC/EAC: The Rapidly Evolving Cyber CrimeArticles

BEC/EAC: The Rapidly Evolving Cyber Crime

10 October, 2019
By Richard Kafui0articles, Business Email Compromise, Cyber Security, Sherrif Issah, Social engineering

Business Email Compromise / Email Account Compromise (BEC/EAC) is a rapidly evolving internet fraud that targets both businesses and the general public. BEC is targeted at businesses, whilst EAC is…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
© 2025 INSTITUTE OF ICT PROFESSIONALS GHANA. All Rights Reserved. Privacy Policy || Professional Bodies License No.: PB 94