Skip to content
Search for:
Professional Bodies License No.: PB 94
INSTITUTE OF ICT PROFESSIONALS GHANA
CONTACT USinfo@iipgh.org
AddressOKSART Place, 2nd Floor, Ring Road Central – Circle
DONATE
  • Home
  • About Us
    • OUR INSTITUTE
    • Institute Structure
  • Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • ACADEMY
    • Coding Education for Ghana Program
      • The Coding Program
      • The Coding Caravan
      • Digital Design and Creative Coding
    • Downloads
      • Coding Brochure
      • Coding Program FAQ
      • Coding Caravan brochure
  • Media & Gallery
    Gallery
    Articles
    OUR VIDEOS
    PUBLIC AWARENESS
    OUR EVENT
    NEWS FEED
    Gallery
    gallery15
    confslide4
    confslide13
    gallery8
    gallery1
    Object
    gallery2
    Object
    VIEW MORE
  • Services
    • Consulting Service
    • Public Education / Capacity Building
      • Cyber Security Awareness
      • Tech Entrepreneurs Forum
      • Tech Job Fair
      • Industry Academia Tech Dialogue
      • The Coding Caravan
      • National Teaching Council
      • Women In Tech
        • Women Led Program
  • Contacts Us
Search for:
Page 2
Homepage
/
Sherrif Issah
/
Sherrif Issah
/
Page 2

Tag: Sherrif Issah

Ghana’s Cybersecurity Act at A GlanceArticles

Ghana’s Cybersecurity Act at A Glance

04 April, 2021
By Richard Kafui0articles, Cybersecurity Act, Ghana, Sherrif Issah

Background Ghana’s Cybersecurity Act, 2020 (Act 1038) was passed by the Parliament of Ghana on 6th November 2020 and assented by President Akufo-Addo into law on 29th December 2020. It…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
The growing animus between Information Technology and Information SecurityArticles

The growing animus between Information Technology and Information Security

22 October, 2020
By Richard Kafui0articles, Information Security, Information Technology, Sherrif Issah

Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
The Sherrif Security IndicatorArticles

The Sherrif Security Indicator

16 October, 2020
By Richard Kafui0articles, Cyber Security, Information Security, Sherrif Issah, The Sherrif Security Indicator

As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Information Security Governance: the cornerstone of effective information protectionArticles

Information Security Governance: the cornerstone of effective information protection

09 October, 2020
By Richard Kafui0articles, Governance, Information Protection, Information Security, Sherrif Issah

Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Social Engineering; The Greatest Catalyst for Successful Cyber AttacksArticles

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks

02 October, 2020
By Richard Kafui0articles, Cyber Security, cyber-attacks, Sherrif Issah, Social engineering

Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Information Security Risk Assessments of SuppliersArticles

Information Security Risk Assessments of Suppliers

21 May, 2020
By Richard Kafui0articles, Information Security, InfoSec, Risk Assessments, Sherrif Issah

Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide full cooperation to their customers when it comes to…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
BEC/EAC: The Rapidly Evolving Cyber CrimeArticles

BEC/EAC: The Rapidly Evolving Cyber Crime

10 October, 2019
By Richard Kafui0articles, Business Email Compromise, Cyber Security, Sherrif Issah, Social engineering

Business Email Compromise / Email Account Compromise (BEC/EAC) is a rapidly evolving internet fraud that targets both businesses and the general public. BEC is targeted at businesses, whilst EAC is…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn

Posts pagination

PREV 1 2 3 4 NEXT
© 2025 INSTITUTE OF ICT PROFESSIONALS GHANA. All Rights Reserved. Privacy Policy || Professional Bodies License No.: PB 94