Skip to content
  • Home
  • About
    • Our Institute
    • Institute Structure
  • Membership
    • About Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • Academy
    • Coding
      • Coding Profile
    • Professional Developement
  • Services
  • Media & News
    • Articles
    • Our Videos
    • Our Gallery
    • Public Awareness
    • Our Events
    • News Feed
  • Contact
Menu
  • Home
  • About
    • Our Institute
    • Institute Structure
  • Membership
    • About Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • Academy
    • Coding
      • Coding Profile
    • Professional Developement
  • Services
  • Media & News
    • Articles
    • Our Videos
    • Our Gallery
    • Public Awareness
    • Our Events
    • News Feed
  • Contact
  • TechJobFair
  • INDAC-TED
  • GodiAfrica
Menu
  • TechJobFair
  • INDAC-TED
  • GodiAfrica
  • Login
  • Register
Menu
  • Login
  • Register

Address
OKSART Place, 2nd Floor, Ring Road Central – Circle

Email
info@iipgh.org

Tel
+233242773762

  • Home
  • About
    • Our Institute
    • Institute Structure
  • Membership
    • About Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • Academy
    • Coding
      • Coding Profile
    • Professional Developement
  • Services
  • Media & News
    • Articles
    • Our Videos
    • Our Gallery
    • Public Awareness
    • Our Events
    • News Feed
  • Contact
Menu
  • Home
  • About
    • Our Institute
    • Institute Structure
  • Membership
    • About Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • Academy
    • Coding
      • Coding Profile
    • Professional Developement
  • Services
  • Media & News
    • Articles
    • Our Videos
    • Our Gallery
    • Public Awareness
    • Our Events
    • News Feed
  • Contact
Search
Close
Facebook-f Twitter Linkedin-in Instagram Youtube

Information Security

  1. Home>
  2. Information Security
Read more about the article Personal Data Breach – Implications and Consequences

Personal Data Breach – Implications and Consequences

  • Post published:May 29, 2022
  • Post category:Articles
  • Post comments:0 Comments

In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…

Continue ReadingPersonal Data Breach – Implications and Consequences
Read more about the article The Offensive Approach to Ghana’s Voter Data Exposure

The Offensive Approach to Ghana’s Voter Data Exposure

  • Post published:November 28, 2020
  • Post category:Articles

A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…

Continue ReadingThe Offensive Approach to Ghana’s Voter Data Exposure
Read more about the article The growing animus between Information Technology and Information Security

The growing animus between Information Technology and Information Security

  • Post published:October 22, 2020
  • Post category:Articles

Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…

Continue ReadingThe growing animus between Information Technology and Information Security
Read more about the article The Sherrif Security Indicator

The Sherrif Security Indicator

  • Post published:October 16, 2020
  • Post category:Articles

As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…

Continue ReadingThe Sherrif Security Indicator
Read more about the article Information Security Governance: the cornerstone of effective information protection

Information Security Governance: the cornerstone of effective information protection

  • Post published:October 9, 2020
  • Post category:Articles

Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…

Continue ReadingInformation Security Governance: the cornerstone of effective information protection
Read more about the article Information Security Risk Assessments of Suppliers

Information Security Risk Assessments of Suppliers

  • Post published:May 21, 2020
  • Post category:Articles

Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide full cooperation to their customers when it comes to such assessments because, it is also in their interest to be secured.

Continue ReadingInformation Security Risk Assessments of Suppliers
Read more about the article Compliance with the Bank of Ghana Cyber & Information Security Directive

Compliance with the Bank of Ghana Cyber & Information Security Directive

  • Post published:March 17, 2019
  • Post category:Articles

Introduction: Cybersecurity Ventures in its 2019 Official Annual Cybercrime Report, mentions that Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. It…

Continue ReadingCompliance with the Bank of Ghana Cyber & Information Security Directive
Read more about the article Cybersecurity and Information Security: Are they the same?

Cybersecurity and Information Security: Are they the same?

  • Post published:January 13, 2019
  • Post category:Articles

Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity,…

Continue ReadingCybersecurity and Information Security: Are they the same?
Read more about the article Poor InfoSec Practices: Lessons to be learnt

Poor InfoSec Practices: Lessons to be learnt

  • Post published:September 2, 2018
  • Post category:Articles

Introduction Some organizations and employees tend to relegate the need for proper information security (InfoSec) practices in their day to day activities. This article examines the negative effects of poor…

Continue ReadingPoor InfoSec Practices: Lessons to be learnt
Read more about the article Information Security in Project Management

Information Security in Project Management

  • Post published:May 27, 2018
  • Post category:Articles

…. a forgotten critical success factor in Project Management INTRODUCTION Information Security (InfoSec) in Project Management (PM) refers to the protection of confidentiality, integrity and availability of project information. Scope,…

Continue ReadingInformation Security in Project Management
  • 1
  • 2
  • Go to the next page

The Institute of ICT Professionals, Ghana is a non-profit organisation which is made up of members in various domains of Information and Communication Technology (ICT) practice.

Facebook-f Twitter Linkedin-in Instagram Youtube

Quick Links

  • Membership
  • Academy
  • Services
  • Careers
  • Login
  • Register

Contact Info

  • OKSART Place, 2nd Floor, Ring Road Central - Kwame Nkrumah Ave (Next to Ernest Chemists)
  • +233 242 773 762
  • info@iipgh.org
  • Opening Hours: Mon-Fri
    8:00 - 17:00

Newsletter

Subscribe to our content update

Institute of ICT Professionals Ghana (IIPGH)
Copyright © 2022 – All Rights Reserved

 REGISTER FOR FREE !!!