Peter Magemeso

Enhance your cyber hygiene in your virtual education/online presence

What’s your worst cyber nightmare? What is your plan to prevent this and should something happen, mitigate it? Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your …

Enhance your cyber hygiene in your virtual education/online presence Read More »

Mobile Gadgets And Work Computers Are Left Open To Attack

As of the fourth industrial revolution today, information is the most crucial and important asset to any organization. It is, for this reason, that information to any organization should be protected wherever it resides to protect any business against reputational risks and loss of money. Businesses are trying hard to keep their networks and devices …

Mobile Gadgets And Work Computers Are Left Open To Attack Read More »

The value of Social Engineering pen-testing

Penetration testing is done in different ways, apart from other penetration testing processes, Social Engineering is one of the fundamental techniques and methodologies that is so important, which all organizations should embrace to assess their level of resilience towards information security.  As human beings continue to be the weakest link in the security chain, organizations …

The value of Social Engineering pen-testing Read More »

The Value of an IT Budget to your organization

Your data is valuable and should belong to you!! But what guarantee do you have that your online records are owned, accessed, and or reviewed by you alone? Yes, you deserve the right to ownership of your personal/and or organizational records, created and processed by you. Nevertheless, our online records are exposed on an almost …

The Value of an IT Budget to your organization Read More »

How to ensure safe work from Home Cyber-Hygiene

Looking at the array of technical countermeasures available to protect confidential data and computer systems has certainly expanded as compared to the last decade.  Most corporate IT departments now allocate a significant portion of their budgets to information security. What isn’t clear is whether systems are more secure as a result. It is now a …

How to ensure safe work from Home Cyber-Hygiene Read More »

Take caution, prevent hackers’ access to your bank accounts

In the realm of this fourth industrial revolution, the security of our accounts starts with the creators/owners of the accounts. In many data breaches that have ever happened, it has been noticed that these start with weakly protected accounts and the laxity of account owners in addition to other causes. One other case to be …

Take caution, prevent hackers’ access to your bank accounts Read More »

Patient’s platforms regarded as target

How to protect from the Cyber Risks created by technology providers with the use of mobile and patient portals. It has been noticed from various studies like Kantar (on 20th March 2020), about best practice cybersecurity methods for Remote care which have shown that privacy and security concerns are hindering patients’ willingness to use health …

Patient’s platforms regarded as target Read More »

Risking your Browsing History/activity to Public WiFi owners..

Public Wi-Fi is found most popular in public places like airports, coffee shops, malls, restaurants, and hotels. It allows everyone that is short of their mobile data or enthusiastic about wireless connectivity (like it is experienced in most internet users), to access the Internet freely in such places. These owned networks (Hotspots) are so widespread …

Risking your Browsing History/activity to Public WiFi owners.. Read More »

Are You Prepared for Next Cyber Threats?

As technology takes on a high trend in the fourth industrial revolution, a yet-coming world that will take on the next edge, almost entirely digitized and automatized with machinery and connected. This generation will expose companies to vast new cybersecurity risks and will bring about more attention to secure confidential assets. According to the EU …

Are You Prepared for Next Cyber Threats? Read More »

DNS poisoning redirects users to fake sites (Cyber Attack)

Humankind, not computers, are the pivot region for computer threats.  As predators (hackers) victimize others for their gain, access to secure networks is given to predators by humankind knowingly or without know-how, network assets are accessed with the intervention of humankind. Threat actors are unauthorized users who break into computer systems to steal, change or …

DNS poisoning redirects users to fake sites (Cyber Attack) Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.