Skip to content


Mastering Your Facebook Timeline: A Guide to Managing Tags and Content – Abraham Selby

Introduction In today’s digital age, our Facebook timelines serve as a reflection of our lives, showcasing moments, memories, and connections. However, managing this virtual space

Critical Information Infrastructure, Compliance & Responsible Disclosure: The Case of a Transport System called “Tap N Go” – Desmond Israel ESQ

The Launch:Ghana’s ambitious drive towards digital transformation reached a significant milestone with the introduction of Tap and Go which sought to improve its predecessor the

Navigating Compliance: Key Principles and Practical Implementation of the Data Protection Act in Safeguarding Personal Data

Author: Sebastian Bernard Nii Ashaley Cofie – Ghana ๐Ÿ‡ฌ๐Ÿ‡ญ Data protection laws exist to safeguard individuals’ privacy and control over their personal information in the

Defense Mechanisms Against Harmful Internet Content has been published by ICANN

Written by: Carlos Hernandez Ganan, Siรดn Lloyd, and Samaneh Tajalizadehkhoob Reputation Block Lists (RBLs) serve as a common defense against harmful and unwanted Internet content. These lists

Harnessing Artificial Intelligence for Enhanced Information Security Risk Assessment and Threat Intelligence ย – Author: Gordon Fiifi Donkoh

Introduction In the constantly evolving landscape of cyber threats, maintaining robust information security has become an essential aspect of organizational resilience. As the volume and

Clandestine SIM-Linkage in Ghana: An Opinion on the Logic Flaw – Desmond Israel

Background For the past two weeks, I  have followed some media stories concerning the linking of multiple phone numbers to national identity cards in Ghana

Copyright 2021 The Digital Finder || All Rights Reserved || Subsidiary of Seltech Group