Image for post
Image for post
Photo by bruce mars on Unsplash

In our current society, we have been conditioned to believe that success means getting the best degree from the best universities, being promoted at work or accumulating financial wealth. If we don’t achieve these tasks, we feel like we have failed. From childhood to adulthood, we’ve been conditioned to believe success is amassing material wealth and being number one at everything. However, this is far from the truth. The definition of success, in my opinion, is someone who is striving to be happy every day.

I am not making an argument that we shouldn’t be aiming to obtain wealth. From when I can remember as a child, we were constantly struggling and lived in poverty for most of my life. When you grow up in this sort of environment, you become very motivated by material items which you think will result in happiness. In fact, I strongly believe that everybody should strive to become financially established. Having financial freedom is one of the most important fundamentals in life. It allows us to dictate our own time and do things that we enjoy, and it enables us to pursue our passions. It provides us with options, however, what most people fail to recognize about money is that it does not intrinsically make us happy. If you are not content without wealth, it is unlikely that you will be with it. …


Image for post
Image for post

Introduction

Computer security incident response has always been an important component of any successful information security program. However, with the frequency in cyber-attacks over the past few years and especially during COVID-19 — it has become even more critical that organizations plan accordingly to respond to new and emerging threats. An organizations ability to response quickly and effectively will reduce the impact on business operations and provide the best opportunity for the implementation of a Business Continuity Plan (BCP).

Incident response is an important part BCP, because BCP members rely on timely and accurate information to make important decision when an incident occurs and often time incident response teams are the first to investigate an issue that has occur that negatively impact business operations. Although Preventive measure based on the results of risk assessments can reduce the number of incidents, however not all incidents can be prevented. Thus, having a robust enterprise-wide incident response plan is necessary for “rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services” (NIST Special Publication…


Image for post
Image for post

Introduction

There has been an increasing trend in the public sector to use predictive analytics to predict and solve some of society’s biggest policy challenges. Governments are using predictive analytics tools to try to help build more effective programs and policies before they are approved and funded. The healthcare industry uses machine learning to detect heart attacks and Alzheimer’s diseases before its onset — In the Criminal Justice System (CJS), courts are partnering with private and public sector organizations to develop risk assessment tools to produce new ways of thinking about and managing risk — and assessing recidivism.

The use of predictive analytics tools in the CJS has been widely supported as a new solution at sentencing “meant to improve the allocation of resources through objective, consistent, and neutral assessment — and helps to reduce or eliminate human errors and bipartisan interest in criminal justice reform” (Eagin, 2017). While some may see these technological advancements in the criminal justice system as progressive, they also reflect an ominous trend towards digital monitoring and decision making without regulatory oversight on private companies, ‘who build and sell proprietary predictive models using confidential datasets”(Rudy and Ustun, 2015). …


Image for post
Image for post

Introduction.

In recent years the level and sophistication of cyber-attacks have increased exponentially. The growing and evolving cyber threats are causing havoc for public and private sector organizations and information security professionals who are in charge of defending their information assets from threat actors. The increased level of sophistication from threat actors is due to the improvement in technology but can largely be attributed to the involvement of nation-states in cyberspace — either by actively participating or funding proxy groups.


Image for post
Image for post

Introduction

As the world faces uncertain times, due to the spread of the coronavirus, businesses and public sector organizations security teams are scrambling to put the necessary security controls in place for remote workers. A pandemic of this magnitude has increased dependency on digital communications. The Internet of Things (IoT) has instantaneously become the preferred channel for effective human interactions and communication which has also increased the threat surface exponentially.

Cybercriminals are increasingly exploiting human vulnerabilities via social engineering techniques. The FBI’s national security and criminal investigative division released a statement noting that due to COVID-19 they have seen a rapid increase in phishing scams. Similarly, Homeland Security, the U.S. Secret Service and the World Health Organizations have all issued similar warnings regarding coronavirus-related scams. The UK Department for Digital, Culture Media & Sport released its 2020 Cybersecurity Breach Survey. …


Image for post
Image for post

Introduction

The rapid increase of the coronavirus has forced many organizations to implement telework policies to stop the spread of the virus. Telework is an alternative work arrangement available to employees and it allows employees, contractors, and third-party vendors to work from remote locations other than the organization facilities. Teleworkers utilize different devices, “such as laptop computers, smartphones, and tablets, to read and send an email, access websites, review and edit, and perform many other tasks”(NIST, 2020). While this is convenient there is a significant security risk associated with teleworkers.

For security administrators, network engineers and computer security managers this presents a huge security challenge and risk because it increases the threat environment for organizations. A recent report by the National Institute of Standard Technology (NIST) found that “telework and remote access technologies often need additional protection because their nature generally places them at higher exposure to external threats than technologies only accessed from inside the organization” (NIST, 2020). …


Image for post
Image for post

Introduction

Historically Canada’s relationship with the African continent has sat between two competing impulses, which have been deeply embedded in the Canadian public and policy elite. The first impulse sees Canada engage when there is a crisis, such as famine, a disease outbreak or a humanitarian crisis (black, 2016). In this case, Canada usually responds with positive rhetoric that is almost always followed by a lack of any long-term commitment or a follow-up action plan. The other impulse sees policy and academic elites (realists) perceive any significant amount of resources dedicated towards Africa whether it is human, institutional, or financial as not being a priority and being a waste of resources (Black). …


Image for post
Image for post

Canada became the second country after Uruguay to legalize recreational use of Cannabis on the 17th of October 2018. The complexity of Cannabis legalization is that it cut across different public policy areas such as public safety, public health, economic development and taxation among others. This will create challenges for policy implementers as the Cannabis Act is creating a whole new regulatory regime. One of the initial comments by Canadian cannabis companies is that some of the regulatory measures in the Act, especially those related to advertisement and promotion are too rigid. The companies argue that this may drive consumers to the black market, which will contradict some of the policy objectives the Canadian Government sought to achieve when it legalizing cannabis. …


Image for post
Image for post

Africa has the biggest emerging markets and the youngest population in the World. The UN estimated by 2050, the world population will surpass 9 billion, with Africa accounting for the majority of the 2.3 billion increase — which is more than India and China combined. In contrast, developed countries population is expected to increase slightly from 1.23 billion to 1.28 billion (United Nations, Department of Economics and Social Affairs, Population Division, 2009).

The rapid increase in the African population has several implications for policymakers who want to engage the continent. Firstly, appropriate policies need to be designed to promote sustainable economic development which will benefit all segments of the population. Secondly, African countries are integrating into the global economy which is driven by the emerging markets in Asia, thus they are seeking new emerging markets to conduct business in. Thirdly, economic policies need to address economic development that is focused on sustainable poverty reduction and promotes climate change. The integration of the world means the outbreak of diseases, economic and social failures are easily transferred from one country to the other. …


Image for post
Image for post

In Canada, the health and safety of employees: is the responsibility of the employers, supervisor, and senior management. If measures are not taking to prevent workplace injury the financial and social costs can be tremendous for an organization. Such as hiring and retraining new employees to replace injured workers and paying worker compensation claims. According to the Association of Workers’ Compensation Boards of Canada, in 2007 Canadian companies spend 9.6 billion paying workers compensation from workplace injury claims. …

About

Henry Awere

Henry Awere is the Founder of Strategic Consulting. He holds a Master's degree in Public Policy and is pursuing a Postgraduate Certificate in Cyber Security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store