Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…
Tag: Information Security
ArticlesThe Sherrif Security Indicator
By Richard Kafui0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
ArticlesInformation Security Governance: the cornerstone of effective information protection
By Richard Kafui0Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…
ArticlesInformation Security Risk Assessments of Suppliers
By Richard Kafui0Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide full cooperation to their customers when it comes to…
ArticlesCompliance with the Bank of Ghana Cyber & Information Security Directive
By Richard Kafui0Introduction: Cybersecurity Ventures in its 2019 Official Annual Cybercrime Report, mentions that Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. It…
ArticlesCybersecurity and Information Security: Are they the same?
By Richard Kafui0Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity,…
ArticlesPoor InfoSec Practices: Lessons to be learnt
By Richard Kafui0Introduction Some organizations and employees tend to relegate the need for proper information security (InfoSec) practices in their day to day activities. This article examines the negative effects of poor…

