New student deal: up to 40% off | Sign up now to get courses for as low as $230.0 each. New users only.

Menu

IFIS

Cybersecurity BCP/DR Planning

The Institute of Forensics and ICT Security (IFIS) has been providing training to organizations in setting up an effective Business Continuity and Disaster Recovery plan (BCP/DR) as an overall coverage for contingency planning. Experience has shown that organizations do not include procedures for handling a BCP/DR training and those organizations that had these plans, they …

Cybersecurity BCP/DR Planning Read More »

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR)

No company should get ready. It should stay ready. That way, there are no surprises. The case of fire at one of Toyota offices in Kampala that led to loss of a brand-new car worth over US $100,000 to fire is still. Indeed, many disasters have happened and caused some businesses to collapse altogether. The …

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR) Read More »

The state of cybersecurity in Uganda

A discussion with Mustapha B. Mugisa, of www.mustaphamugisa.com. How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of …

The state of cybersecurity in Uganda Read More »

The deadly insiders

The enemy within is deadlier than the one without. As a business leader or entrepreneur, it is your business to keep a watch on the kind of activities staff conduct The issue Many current and former staff steal intellectual property. This makes the company less competitive. The easiest way to steal intellectual property is through …

The deadly insiders Read More »

Everyone is a potential fraudster. Here is why

For the last ten years, since Institute of Forensics and ICT Security (www.forensicsinstitute.org) started fraud awareness initiative, I have visited several organisations and met with so many CEOs and top managers in the region. Most of the leaders don’t want to acknowledge the extent of the fraud problem within their organisations. Yet the statistics are …

Everyone is a potential fraudster. Here is why Read More »

Lawyers’ vs Internal Auditors’: why lawyers are miles ahead in value addition? Part 2

Although Internal Auditors talk about value delivery, the value they deliver is not easily visible to management. Consider the following key areas of concerns: Information security assurance– this is one of the key things that keep most CEO’s awake at night. Few Internal Auditors have skills to conduct independent and thorough ICT security assessment and …

Lawyers’ vs Internal Auditors’: why lawyers are miles ahead in value addition? Part 2 Read More »

Lawyers’ vs Internal Auditors’: Why CEOs and other top executives value lawyers more than the auditors? Part 1

Have you ever wondered why most CEOs will make the first call to their lawyers when faced with a key decision and ignore the internal auditor and or the accountant altogether? Wonder no more. First, we need to understand the difference between a good lawyer and a bad lawyer. The key difference is the quality …

Lawyers’ vs Internal Auditors’: Why CEOs and other top executives value lawyers more than the auditors? Part 1 Read More »

Banking sector: Reconsider your Business Continuity Strategy

Kenya recently suffered a terrible terrorist attack at the DusitD2 complex on Riverside Drive. This complex houses many businesses and among them, a bank. It goes without saying that business operations of this bank were disrupted in one way or another. One needs to pause and reflect on how the financial institution with which they …

Banking sector: Reconsider your Business Continuity Strategy Read More »

Data Breaches: Are you a Victim?

Data Breaches: Are you a victim? In a world that is using the internet for all sorts of activities, there are concerns that various users have about the cyber space and how data confidentiality is handled by the applications, websites and gadgets that we use on a day to day basis.

Understanding your target audience and target market

Anyone owning a business has to know who is in their customer circle, but just that rough idea will never be enough in this competitive market. One has to go deep into the details otherwise you are marketing to everyone hence spending too much and missing opportunities to increase sales The marketeers need to know …

Understanding your target audience and target market Read More »

Subscribe to Our Newsletters

Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
Connecting...
None of our operators are available at the moment. Please, leave your details and we will get back to you shortly. Include your phone number in the message
Our operators are busy. Please try again later
:
:
:
Have you got question? Write to us!
:
:
Thank you for chatting with us. Please contact us anytime you have a question
Was this conversation useful? Vote this chat session.
Good Bad
Scroll to Top