Ransomwares belong to a group of software called Malwares―Malicious Softwares. Malwares are softwares designed with the intention to cause damage or disruption to computer systems, that is, PCs, mobile phones, tablets, etc. and networks. Continue reading Ransomware And What You Have To Know
If vital installations like our power grids, water generation and health-care delivery even transport are being automated these days, Continue reading Cyber-security and Key Infrastructure Installations: Why We Must Care
An economic recession is not a pretty time for a people nor one to behold. Peoples entire life savings and investment are rubbished to zilch by no fault of theirs really. The last time the world saw an economic recession … Continue reading Is The Ghanaian Economy In Recession?
Democracy has been proven to be the political womb of development since its conception in ancient Greece. The key feature of democracy is the freedoms and liberties it provides, especially its freedom of speech. It has brought about a culture … Continue reading Sophisticated Information Technology in an Era of the History of Democracy: A Hindrance or An Advantage?
Today’s businesses are exposed to several operational risks on their mission to solve a need for today’s sophisticated consumer. Businesses of all sizes, large, medium and small are exposed to risks in one form or another. The risks may arise … Continue reading 8 Steps To Minimize Risk of Data Breach For Your Business
Information technology systems comprise software and hardware purposely designed to aid in accomplishing business tasks and objectives. They collect, process, organize, communicate and store information for smooth, effective and efficient running of an organization. IT systems simplify complex business processes … Continue reading Key Reasons Why IT Systems Are Challenged or Fail
The internet today is more than just a super-fast information technology tool. The internet connects people and systems, and facilitates transactions across borders in ways we never imagined. It offers enormous advantages to it users. With the help of the … Continue reading In The Cyber Jungle: How Safe is the Ghanaian Internet User?
We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another. In its scale, scope, and complexity, the transformation will be unlike anything humankind has experienced before. We do not yet know just how it will unfold, but one thing is clear: the response to it must be integrated and comprehensive, involving all stakeholders of the global polity, from the public and private sectors to academia and civil society. The First Industrial Revolution used water and steam power to mechanize production. The Second used electric power to create … Continue reading The Fourth Industrial Revolution: What It Means, How To Respond
Young Ghanaian entrepreneur, Bright Simons, has made the MIT Technology Review 35 Innovators under 35 list for 2013 for his innovation which enables people to determine whether their medicine is genuine, using text message technology. Bright’s mPedigree Network has developed system where … Continue reading Bright Simons Makes MIT Technology Review List of Top 35 Innovators Under 35, 2013