Introduction In the world of software development, the question of who owns the source code is a significant and sometimes contentious issue. This controversy touches on various aspects of intellectual…
Tag: Information Security

Joiners, Movers, and Leavers
By Richard Kafui0Joiners, Movers, and Leavers represent critical phases in an employee’s lifecycle that significantly impact an organization’s information security. By implementing robust practices during these events, organizations can strengthen their overall…

Personal Data Breach – Implications and Consequences
By Richard Kafui0In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…

The Offensive Approach to Ghana’s Voter Data Exposure
By Richard Kafui0A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…

The growing animus between Information Technology and Information Security
By Richard Kafui0Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…

The Sherrif Security Indicator
By Richard Kafui0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…

Information Security Governance: the cornerstone of effective information protection
By Richard Kafui0Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…