The reality today is that, cybersecurity is no longer the exclusive domain of tech experts. As data breaches make headlines, ransomware cripples critical infrastructure, and digital privacy becomes a global…
Tag: Information Security
ArticlesThe Sherrif Security Indicator v6.25
By Andy Teye0Introduction The Sherrif Security Indicator (TSSI) is an annual online survey that is organized to commemorate the Cyber Security Awareness Month. TSSI researches into the most critical security concerns of…
ArticlesWho Owns Source Codes?
By Donatus Ankah0Introduction In the world of software development, the question of who owns the source code is a significant and sometimes contentious issue. This controversy touches on various aspects of intellectual…
ArticlesJoiners, Movers, and Leavers
By Richard Kafui0Joiners, Movers, and Leavers represent critical phases in an employee’s lifecycle that significantly impact an organization’s information security. By implementing robust practices during these events, organizations can strengthen their overall…
ArticlesPersonal Data Breach – Implications and Consequences
By Richard Kafui0In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…
ArticlesThe Offensive Approach to Ghana’s Voter Data Exposure
By Richard Kafui0A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
ArticlesThe growing animus between Information Technology and Information Security
By Richard Kafui0Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…

