Personal Data Breach – Implications and Consequences
In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…
In the hyper-connected world of today, these breaches are a threat to both organizations and people. Teams in charge of security no longer ask themselves if an attack is coming,…
A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google drive. However, the source of the publication…
Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…
As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…
Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide full cooperation to their customers when it comes to such assessments because, it is also in their interest to be secured.
Introduction: Cybersecurity Ventures in its 2019 Official Annual Cybercrime Report, mentions that Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. It…
Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity,…
Introduction Some organizations and employees tend to relegate the need for proper information security (InfoSec) practices in their day to day activities. This article examines the negative effects of poor…
…. a forgotten critical success factor in Project Management INTRODUCTION Information Security (InfoSec) in Project Management (PM) refers to the protection of confidentiality, integrity and availability of project information. Scope,…