Introduction The Sherrif Security Indicator (TSSI) is an annual online survey that is organized to commemorate the Cyber Security Awareness Month. TSSI researches into the most critical security concerns of…
Tag: Information Security
 Articles
ArticlesWho Owns Source Codes?
By Donatus Ankah0Introduction In the world of software development, the question of who owns the source code is a significant and sometimes contentious issue. This controversy touches on various aspects of intellectual…
 Articles
ArticlesJoiners, Movers, and Leavers
By Richard Kafui0Joiners, Movers, and Leavers represent critical phases in an employee’s lifecycle that significantly impact an organization’s information security. By implementing robust practices during these events, organizations can strengthen their overall…
 Articles
ArticlesPersonal Data Breach – Implications and Consequences
By Richard Kafui0In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…
 Articles
ArticlesThe Offensive Approach to Ghana’s Voter Data Exposure
By Richard Kafui0A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
 Articles
ArticlesThe growing animus between Information Technology and Information Security
By Richard Kafui0Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…
 Articles
ArticlesThe Sherrif Security Indicator
By Richard Kafui0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…

