Skip to content
Search for:
Professional Bodies License No.: PB 94
INSTITUTE OF ICT PROFESSIONALS GHANA
CONTACT USinfo@iipgh.org
AddressOKSART Place, 2nd Floor, Ring Road Central – Circle
DONATE
  • Home
  • About Us
    • OUR INSTITUTE
    • Institute Structure
  • Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • ACADEMY
    • Coding Education for Ghana Program
      • The Coding Program
      • The Coding Caravan
      • Digital Design and Creative Coding
    • Downloads
      • Coding Brochure
      • Coding Program FAQ
      • Coding Caravan brochure
  • Media & Gallery
    Gallery
    Articles
    OUR VIDEOS
    PUBLIC AWARENESS
    OUR EVENT
    NEWS FEED
    Gallery
    gallery15
    confslide4
    confslide13
    gallery8
    gallery1
    Object
    gallery2
    Object
    VIEW MORE
  • Services
    • Consulting Service
    • Public Education / Capacity Building
      • Cyber Security Awareness
      • Tech Entrepreneurs Forum
      • Tech Job Fair
      • Industry Academia Tech Dialogue
      • The Coding Caravan
      • National Teaching Council
      • Women In Tech
        • Women Led Program
  • Contacts Us
Search for:
Information Security
Homepage
/
Information Security

Tag: Information Security

Who Owns Source Codes?Articles

Who Owns Source Codes?

01 December, 2024
By Donatus Ankah0articles, Emmanuel Gadasu, Information Security, Ownership, Software, Source Codes, Technology

Introduction In the world of software development, the question of who owns the source code is a significant and sometimes contentious issue. This controversy touches on various aspects of intellectual…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Joiners, Movers, and LeaversArticles

Joiners, Movers, and Leavers

09 July, 2023
By Richard Kafui0articles, Information Security

Joiners, Movers, and Leavers represent critical phases in an employee’s lifecycle that significantly impact an organization’s information security. By implementing robust practices during these events, organizations can strengthen their overall…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Personal Data Breach – Implications and ConsequencesArticles

Personal Data Breach – Implications and Consequences

29 May, 2022
By Richard Kafui0articles, Data Protection, Emmanuel Gadasu, Information Security, Personal Data Breach

In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
The Offensive Approach to Ghana’s Voter Data ExposureArticles

The Offensive Approach to Ghana’s Voter Data Exposure

28 November, 2020
By Richard Kafui0articles, Blay Abu Safian, Cyber Security, Data Protection, Electoral Commission, Ghana, Information Security

A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
The growing animus between Information Technology and Information SecurityArticles

The growing animus between Information Technology and Information Security

22 October, 2020
By Richard Kafui0articles, Information Security, Information Technology, Sherrif Issah

Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
The Sherrif Security IndicatorArticles

The Sherrif Security Indicator

16 October, 2020
By Richard Kafui0articles, Cyber Security, Information Security, Sherrif Issah, The Sherrif Security Indicator

As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Information Security Governance: the cornerstone of effective information protectionArticles

Information Security Governance: the cornerstone of effective information protection

09 October, 2020
By Richard Kafui0articles, Governance, Information Protection, Information Security, Sherrif Issah

Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn

Posts pagination

1 2 NEXT
© 2025 INSTITUTE OF ICT PROFESSIONALS GHANA. All Rights Reserved. Privacy Policy || Professional Bodies License No.: PB 94