Blog

How to write a business continuity plan

By Snr. Risk Consultant – Eng. Dan Mokua and Stella Makona…

More

What is a Business Continuity Plan? In simple terms (BCP)

A business continuity plan (BCP) serves as a strategic guide for…

More

THE DATA PROTECTION ACT AND DECEASED INDIVIDUALS’ PRIVACY

In your opinion, Should a deceased person be considered a data…

More

A Guide to Penetration Testing in Cybersecurity

Cyber Security Awareness Month – October 2023. – A Guide…

More

Cyber Security Awareness Month 2023 – October

CyberSec October: A Month-Long VAPT Journey Theme – Unveiling…

More

ODPC Fines Explained – The Elusive Mirage of Consent

DATA PRIVACY PULSE – From Basics to Compliance An Educative…

More

Talent Shield – My remarkable journey as a beneficiary of Cohort I

I am thrilled to share my remarkable journey as a beneficiary of…

More

7 BUSINESS CONTINUITY TAKEAWAYS YOU MISSED FROM THE PREVIOUS BCI EVENT?

The Business Continuity Institute Eastern Africa pulled out all the…

More

SOCIAL MEDIA PRIVACY PARADOX

6 Easy Essential Steps to Stay Connected while Keeping Your Personal…

More

Is your Business set up to sail through Civil disruptions?

Here are Business Continuity Strategies and Solutions you can put in…

More

Benefits of Implementing ISO 27001

1. What is Information Security? The protection of data against…

More

INFORMATION SECURITY RISK ASSESSMENT

Introduction Information security risk assessment is one of the most…

More

Why Holidays Increase the Risk of Cyberattack for Your Business (And How to Take Precautions)

Businesses and other organizations may be vulnerable to a range of…

More

DATA PRIVACY IN HUMAN RESOURCE

Human resource professionals are involved in the data processing.…

More

Mobile Device Security Tips

As today’s technology continues to approach users, “smart…

More

DATA PROTECTION 101

Data protection can be defined as the mechanism of safeguarding…

More

Same Zero Days, New Target: Chrome

If you are using Google Chrome browser on your Windows, Mac, or…

More

Implementation of Data Protection & Data Privacy Regulations

As more and more social and economic activities have place online,…

More

The Future of Internal Audit; Empowering the Third Line

As part of our interactions for Internal Audit Awareness month, we…

More

Common Cybersecurity Trends to Look out for in 2021

There is no question organizations are still reeling from the massive…

More

3 Ways To Protect Your Identity Online

Within security awareness training programs, cybersecurity…

More

MALICIOUS ANDROID APPLICATIONS AND THE THREAT OF THIRD-PARTY APP STORES

Malicious Android applications tend to masquerade as applications…

More

Anatomy of the Traditional Antimalware

In the previous article, we had a comparison between the traditional…

More

BUSINESS CONTINUITY LESSONS FROM 2020

2020 was a tough year for many organizations where we faced a global…

More

2020 CYBERSECURITY, THE YEAR THAT WAS

2020 was a year like no other for all of us, and this especially for…

More

Mobile Security and Information Security

According to www.statistica.com, the internet, mobile security has…

More

×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp