Blog

Microsoft Services Disruptions Across Africa

Major Cable Cut Disrupts Microsoft Services Across Africa…

More

THE DATA PROTECTION ACT AND DECEASED INDIVIDUALS’ PRIVACY

In your opinion, Should a deceased person be considered a data…

More

Integrating Zero-Trust Architecture and ISO 27001:2022 for Robust Data Security

By Joy Chivile, Senior Consultant. In today’s digital…

More

Common Challenges in ISO 27001 Implementation

Scoping the ISMS Introduction For most organizations, adoption of ISO…

More

ESSENTIAL TIPS FOR PERSONAL CYBERSECURITY

With the heightened Cybercrime what are the essential tips for…

More

Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the…

More

Implementation of IT General Controls against ISO 27001 Standard Framework

Complexity of the IT setup has greatly increased. This has resulted…

More

FUNDAMENTALS OF INFORMATION SECURITY CONTROLS

In my time as a Cybersecurity consultant, I have come across many…

More

INFORMATION SECURITY AND BIG DATA ANALYTICS

Current technologies pose different challenges towards solving…

More

INFORMATION SECURITY WHY IT MATTERS

Globally, the information security market is expected to grow at a…

More

Top 5 ways to keep your password secure

Passwords have become necessary in our everyday lives from our…

More

SECURITY OPERATIONS CENTER (SOC) MONITORING SOLUTION

Over the years, before information security theft became complex,…

More

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last…

More

PHISHING

With the ongoing global pandemic, many business and organizations…

More

PRIVACY INFORMATION MANAGEMENT SYSTEMS – PIMS (why your organization needs it)

The industrial revolution has led to a complex and diverse operating…

More

Information Security in Startups

Do not wait to be big to be concerned! Cyber security is fast…

More

×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp