New student deal: up to 40% off | Sign up now to get courses for as low as $230.0 each. New users only.

Menu

Admin

CYBER SECURITY TRAINING FOR BANKS

The banking industry has increased the usage of digital channels such as internet banking, digital wallets, mobile banking and ATM. This increases their exposure to cyber- related attacks which may lead to financial and reputational losses. Police reports in 2016 revealed that Uganda’s monetary loss to cybercrime was UGX. 122 billion. This increased to UGX. …

CYBER SECURITY TRAINING FOR BANKS Read More »

What is Computer Forensics?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly …

What is Computer Forensics? Read More »

Fraud in Mobile Financial Services

The rapid growth of mobile financial services (MFS) has facilitated access to cheap and reliable financial services to an ever increasing formerly unbanked population segment. Innovative mobile money services like M-Pesa in Kenya and Tanzania have grown into major payment services that move billions of dollars annually. Unfortunately, MFS have also rapidly become a conduit …

Fraud in Mobile Financial Services Read More »

Risks in the Insurance Sector

Managing compliance risk is crucial in the challenging environment of the insurance industry. However, because of increased consumer awareness and expectations, evolving business models, new technologies with emerging risks, new waves of regulations, and an unprecedented level of sanctions, insurance companies must revise their risk strategies and invest heavily in compliance. 4 emerging risks for …

Risks in the Insurance Sector Read More »

Cybercrime in Uganda

When it comes to Ugandans, there is a general feeling that Internet crime is an advanced type of crime that has not yet infiltrated the country. The happy-go-lucky nature of the Internet in which anybody publishes anything at any time poses a serious security threat for any nation.

What is a Financial Risk?

Financial risk is the possibility that shareholders or other financial stakeholders will lose money when they invest in a company that has debt if the company’s cash flow proves inadequate to meet its financial obligations. When a company uses debt financing, its creditors are repaid before shareholders if the company becomes insolvent. Financial risk also refers to the …

What is a Financial Risk? Read More »

Evidence in Law

Evidence, in law, refers to any of the material items or assertions of fact that may be submitted to a competent tribunal as a means of ascertaining the truth of any alleged matter of fact under investigation before it. To the end that court decisions are to be based on truth founded on evidence, a primary duty of …

Evidence in Law Read More »

Cloud Penetration Testing

Cloud is the preferred solution for data storage, infrastructure and services on demand today. Penetration testers and ethical hackers are increasingly being called upon to evaluate the security of cloud-based applications, services, and infrastructures. Such work is fraught with political and technical complexity. Penetration testing, the practice of testing a computer system, network, or hosted application to discover vulnerabilities that may …

Cloud Penetration Testing Read More »

How to manage the risk of procurement fraud

Ensure the risk of procurement fraud is acknowledged on your company risk register, and there is a risk owner who has overall responsibility in the organization. Ensure all staff who are able to make or are involved in financial decisions are trained how to identify procurement fraud. Don’t dismiss minor red flags indicating possible fraud …

How to manage the risk of procurement fraud Read More »

What is Data Security

Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is an essential aspect of IT for organizations of every size and type. 5 Ways to Enhance Data Security Limit Data Access Most of the organizations give …

What is Data Security Read More »

Subscribe to Our Newsletters

Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
Connecting...
None of our operators are available at the moment. Please, leave your details and we will get back to you shortly. Include your phone number in the message
Our operators are busy. Please try again later
:
:
:
Have you got question? Write to us!
:
:
Thank you for chatting with us. Please contact us anytime you have a question
Was this conversation useful? Vote this chat session.
Good Bad
Scroll to Top