On 25 January 2019, the Nigeria Data Protection Regulation was issued by the National Information Technology Development Agency (NITDA), the country’s ICT regulator. Among the objectives behind this regulation were the protection of the privacy rights and freedoms of Nigerian citizens, on the one hand, and the promotion of local and foreign investments in the digital economy by safeguarding the information systems infrastructure against breaches… Read More »The Nigerian Data Protection Regulation
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. A successful cybersecurity approach has multiple layers of protection spread across the… Read More »What Is Cybersecurity?
“Hacker” didn’t start out as a bad word, but it’s evolved into one, thanks to hackers of the malicious kind. Despite how oxymoronic the term “ethical hacker” may seem, the Certified Ethical Hacker credential is no joke. Certified Ethical Hacker (CEH) is a computer certification that indicates proficiency in network security, especially in thwarting malicious hacking attacks through pre-emptive countermeasures. Malicious hacking is a felony in… Read More »All About Certified Ethical Hacker (CEH)
The primary duties of a CISA include: Implementing an audit strategy for information systems (IS) that is based on risk management. Planning audits that can be used to determine whether or not IT assets are protected, managed and valuable. Executing the audits in compliance with the organization’s set standards and objectives. Sharing audit results and providing recommendations to management based on the results. Performing reexaminations of the audits to ensure the… Read More »Responsibilities of a Certified Information Systems Auditor
The Nigerian Data Protection Regulation states, under Implementation Mechanism, that every data controller shall: • Designate a Data Protection Officer to ensure adherence to this [NDPR] Regulation, relevant data privacy instruments and data protection directives of the data controller; • [and] may outsource data protection to a verifiably competent firm or person. This is new. The role is made up of new requirements but… Read More »NDPR and the data protection officer function
COBIT stands for Control Objectives for Information and Related Technology. It is a framework created by the ISACA (Information Systems Audit and Control Association) for IT governance and management. It was designed to be a supportive tool for managers—and allows bridging the crucial gap between technical issues, business risks, and control requirements. COBIT is a thoroughly recognized guideline that can be applied to any organization… Read More »COBIT: What It Stands For
Business Intelligence deals with complex strategies and technologies that help end-users in analyzing the data and perform decision-making activities to grow their business. BI plays a key role in business data management and performance management. Data analytics, on the other hand, is implemented to convert the raw or unstructured data into a user understandable meaningful data format. The transformed information can be utilized to cleanse, transform or model the data… Read More »Difference Between Business Intelligence and Data analytics
An operations manual is the backbone of your company – the encyclopedia for your business. Your employee handbook may introduce your team to your mission, various policies (benefits, holiday leave, security), and culture, but the operations manual will show them how to do their job and give them everything they need to do it. Typically the manual is either a book or folder of printed documents containing… Read More »What is An Operations Manual?