Introduction Telecommunication has become a major drive for socio-economic growth, globally. The utilization of the opportunities that come with it has led to the proliferation of telecommunication masts (Masts). Masts…
Tag: Sherrif Issah
IT Business Continuity
By Richard Kafui0Introduction Business Continuity (BC) is the capability of an organization to continue the delivery of products/services at acceptable predefined levels following disruptive incident [Source: ISO 22300]. BC is extremely important…

Compliance with the Bank of Ghana Cyber & Information Security Directive
By Richard Kafui0Introduction: Cybersecurity Ventures in its 2019 Official Annual Cybercrime Report, mentions that Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. It…

Poor InfoSec Practices: Lessons to be learnt
By Richard Kafui0Introduction Some organizations and employees tend to relegate the need for proper information security (InfoSec) practices in their day to day activities. This article examines the negative effects of poor…

The Unaware Data Subjects
By Richard Kafui0. . . Equipping Oneself with the Legal Aspects of data Handling Introduction The Data Protection Act, 2012 (Act 843) is a Ghanaian law that sets out the rules…

Geographic Information System (GIS)
By Richard Kafui0…Benefits of integrating in Project Monitoring & Evaluation Project Monitoring is one of the five phases in Project Management. This activity happens concurrently with the execution phase of a project.…

Information Security in Project Management
By Richard Kafui0…. a forgotten critical success factor in Project Management INTRODUCTION Information Security (InfoSec) in Project Management (PM) refers to the protection of confidentiality, integrity and availability of project information. Scope,…