Blog

CyberShield Monthly Advisory – April 2024

Mitigating Cyber Risks in the Supply Chain: A Comprehensive Technical…

More

How can i convince Management on ISO 27001?

Management remains unconvinced? How can I articulate the advantages…

More

A Comprehensive Guide to ISO 27001 Implementation

Where do i start with ISO 27001 compliance? Everything You Need to…

More

Understanding Data Protection Impact Assessments (DPIA) under the Kenya Data Protection Act

Section 31 of the Data Protection Act of Kenya mandates the…

More

Microsoft Services Disruptions Across Africa

Major Cable Cut Disrupts Microsoft Services Across Africa…

More

What are the rights of data protection?

The Data Protection Act of Kenya is a legislation enacted in 2019…

More

THE DATA PROTECTION ACT AND DECEASED INDIVIDUALS’ PRIVACY

In your opinion, Should a deceased person be considered a data…

More

Data Protection Act Kenya

Frequently Asked Questions (Quick FAQ’s) on data protection act…

More

Assigning the DPO’s ROLE! – The Explainer

Where do you believe is the optimal place within your organization to…

More

Ensuring Data Protection in the Health Sector

by Newton Amani, Consultant at Sentinel Africa. A Comprehensive Guide…

More

Integrating Zero-Trust Architecture and ISO 27001:2022 for Robust Data Security

By Joy Chivile, Senior Consultant. In today’s digital…

More

A Guide to Penetration Testing in Cybersecurity

Cyber Security Awareness Month – October 2023. – A Guide…

More

What is Consent? – Simplified!

DATA PRIVACY PULSE – From Basics to Compliance An Educative…

More

Navigating the Cybersecurity Crossroads: Red Team Simulation vs. VAPT

In your experience, what factors should organizations consider to…

More

Cyber Security Awareness Month 2023 – October

CyberSec October: A Month-Long VAPT Journey Theme – Unveiling…

More

ODPC Fines Explained – The Elusive Mirage of Consent

DATA PRIVACY PULSE – From Basics to Compliance An Educative…

More

Marrakech Earthquake 2023: 5 Lessons in Disaster Preparedness and Resilience

From a Business Continuity Consultants perspective IntroductionThe…

More

Blackout at the International Kenyan Airport – JKIA! Lessons from Kenya’s Blackout Incident

A Business Continuity Expert Opinion In a recent turn of events on…

More

Talent Shield – My remarkable journey as a beneficiary of Cohort I

I am thrilled to share my remarkable journey as a beneficiary of…

More

7 BUSINESS CONTINUITY TAKEAWAYS YOU MISSED FROM THE PREVIOUS BCI EVENT?

The Business Continuity Institute Eastern Africa pulled out all the…

More

SOCIAL MEDIA PRIVACY PARADOX

6 Easy Essential Steps to Stay Connected while Keeping Your Personal…

More

Is your Business set up to sail through Civil disruptions?

Here are Business Continuity Strategies and Solutions you can put in…

More

Benefits of Implementing ISO 27001

1. What is Information Security? The protection of data against…

More

INFORMATION SECURITY RISK ASSESSMENT

Introduction Information security risk assessment is one of the most…

More

Why Holidays Increase the Risk of Cyberattack for Your Business (And How to Take Precautions)

Businesses and other organizations may be vulnerable to a range of…

More

Common Challenges in ISO 27001 Implementation

Scoping the ISMS Introduction For most organizations, adoption of ISO…

More

INCIDENT RESPONSE PREPARATION AND RESPONSE TO RANSOMWARE ATTACKS.

The need to develop an Incident management framework is vital for…

More

DISASTER RECOVERY 101: A PLAN THAT WORKS

[As organizations continue to automate their business processes, the…

More

×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp