Joiners, Movers, and Leavers represent critical phases in an employee’s lifecycle that significantly impact an organization’s information security. By implementing robust practices during these events, organizations can strengthen their overall…
Tag: Information Security
Personal Data Breach – Implications and Consequences
By IIPGH0In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…
The Offensive Approach to Ghana’s Voter Data Exposure
By IIPGH0A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
The growing animus between Information Technology and Information Security
By IIPGH0Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…
The Sherrif Security Indicator
By IIPGH0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
Information Security Governance: the cornerstone of effective information protection
By IIPGH0Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…
Information Security Risk Assessments of Suppliers
By IIPGH0Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide full cooperation to their customers when it comes to…