Security requirements for SOEs outlined


    The State Interests and Governance Authority (SIGA) has urged State-Owned Enterprises(SOEs) to put in place systems to put their organizations under control from cyber attacks.

    According to SIGA, the deployment of cyber security measures would be considered in the performance assessment of State-Owned Enterprises.

    “Cyber security has become necessary because the internet is now part of our lives. We can now hardly live without the internet,” he said.

    “When we have a way to protect ourselves, we do that through the protection of our data, documents, and other confidential digital materials.

    “We are all aware that the advent of the digital age, which is expected to create great value for the industry, also comes with a lot of baggage due to the exposure to the internet and its related cyber security threats and dangers,” he added.

    Speaking at a workshop on CyberSecurity Act,(Act 1038) for CEOs of SOEs, the Director General of SIGA, Stephen Asamoah Boateng urged CEOs of SOEs to ensure that their organizations deploy the relevant tools to enable them to fully embrace cyber security related issues.

    Irrespective of measures and policies put in place to ensure maximum protection of Ghana’s cyberspace like the enactment of the electronic Act 772 of 2008, the establishment of The National Cyber Security Center (NCSC) in 2018 and the recent passing of the cyber security Act in 2020, the country’s cyberspace continues to face enormous threats, making Ghana one of the hotspots as far as cybercrime is concerned.

    The workshop was organized by the Cyber Security Authority (CSA), in collaboration with SIGA, as part of the 2021 Cybersecurity Awareness Month.

    He further noted that CEOs who go contrary to the above will be made to face sanctions. Especially tying the allowances of the CEOs to their ability to enforce cyber security measures in their organizations.

    In conclusion, Mr. Asamoah Boateng assured of SIGA’s readiness to promote computer systems and safety of computers and do effective cyber security monitoring.