Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Departments or units (ISDs). ISDs are gradually becoming ubiquitous…
Tag: Sherrif Issah
The Sherrif Security Indicator
By IIPGH0As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
Information Security Governance: the cornerstone of effective information protection
By IIPGH0Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…
Social Engineering; The Greatest Catalyst for Successful Cyber Attacks
By IIPGH0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…
Information Security Risk Assessments of Suppliers
By IIPGH0Suppliers need to ensure that, InfoSec clauses/requirements contained in contracts with their customers are strictly adhered to. They need to provide full cooperation to their customers when it comes to…
BEC/EAC: The Rapidly Evolving Cyber Crime
By IIPGH0Business Email Compromise / Email Account Compromise (BEC/EAC) is a rapidly evolving internet fraud that targets both businesses and the general public. BEC is targeted at businesses, whilst EAC is…
Telecom Towers: The health and safety implications
By IIPGH0Introduction Telecommunication has become a major drive for socio-economic growth, globally. The utilization of the opportunities that come with it has led to the proliferation of telecommunication masts (Masts). Masts…