New student deal: up to 40% off | Sign up now to get courses for as low as $230.0 each. New users only.



Securing your devices

Man is not an island, and as such we seek to interact more and more with each other. This has led to a level of intercommunication through the internet that hasn’t been seen before. According to ABI Research, there will be over 30 billion devices connected on the Internet by 2020. Today, our everyday devices …

Securing your devices Read More »

Active Network Forensics Solution

The main challenge faced during computer related investigations is the lack of sufficient evidence to pin point which device on the network was used to perpetuate the crime. A computer network consists of devices each of which produces log files of its own. These devices include PCs, Servers, routers and firewalls. PC’s are a great …

Active Network Forensics Solution Read More »

How secure is your bank?

As an executive committee member, CEO or board member of a financial institution, you know one of the most critical assets in your control is the core banking application and other key servers like ATM switch / server, mobile and internet banking server, and security monitoring server, if any, that interact with it to deliver …

How secure is your bank? Read More »

Are you a WannaCry accomplice?

A simple network scanning following a client request; exposed several computers on the network vulnerable to WannaCry attack. Unfortunately, the computer hygiene for most companies is poor. Staff are lazy. They don’t want to learn how to keep their computers secure. They are fast to connect to the Internet to access their social media accounts. …

Are you a WannaCry accomplice? Read More »

Cybersecurity BCP/DR Planning

The Institute of Forensics and ICT Security (IFIS) has been providing training to organizations in setting up an effective Business Continuity and Disaster Recovery plan (BCP/DR) as an overall coverage for contingency planning. Experience has shown that organizations do not include procedures for handling a BCP/DR training and those organizations that had these plans, they …

Cybersecurity BCP/DR Planning Read More »

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR)

No company should get ready. It should stay ready. That way, there are no surprises. The case of fire at one of Toyota offices in Kampala that led to loss of a brand-new car worth over US $100,000 to fire is still. Indeed, many disasters have happened and caused some businesses to collapse altogether. The …

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR) Read More »

The state of cybersecurity in Uganda

A discussion with Mustapha B. Mugisa, of How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of …

The state of cybersecurity in Uganda Read More »

The deadly insiders

The enemy within is deadlier than the one without. As a business leader or entrepreneur, it is your business to keep a watch on the kind of activities staff conduct The issue Many current and former staff steal intellectual property. This makes the company less competitive. The easiest way to steal intellectual property is through …

The deadly insiders Read More »

Everyone is a potential fraudster. Here is why

For the last ten years, since Institute of Forensics and ICT Security ( started fraud awareness initiative, I have visited several organisations and met with so many CEOs and top managers in the region. Most of the leaders don’t want to acknowledge the extent of the fraud problem within their organisations. Yet the statistics are …

Everyone is a potential fraudster. Here is why Read More »

Lawyers’ vs Internal Auditors’: why lawyers are miles ahead in value addition? Part 2

Although Internal Auditors talk about value delivery, the value they deliver is not easily visible to management. Consider the following key areas of concerns: Information security assurance– this is one of the key things that keep most CEO’s awake at night. Few Internal Auditors have skills to conduct independent and thorough ICT security assessment and …

Lawyers’ vs Internal Auditors’: why lawyers are miles ahead in value addition? Part 2 Read More »

Subscribe to Our Newsletters

Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
None of our operators are available at the moment. Please, leave your details and we will get back to you shortly. Include your phone number in the message
Our operators are busy. Please try again later
Have you got question? Write to us!
Thank you for chatting with us. Please contact us anytime you have a question
Was this conversation useful? Vote this chat session.
Good Bad
Scroll to Top