Warning: A non-numeric value encountered in /home/summitbu/public_html/forensicsinstitute/wp-content/plugins/bdthemes-element-pack/modules/post-grid/skins/skin-harold.php on line 82

Cybersecurity Incident Response Planning

As the number of cyber breaches occurring worldwide increases, a number of companies have invested...
Read More
IFIS September 25, 2019
CYBER SECURITY

Cybersecurity: Safeguarding data

First Appeared in TODAY’S Accountant The Magazine for The Institute of Certified Public Accountants of Uganda (ICPAU) ISSUE...
Read More
IFIS September 3, 2019
CYBER SECURITY

Why Insurance players MUST attend the Cybersec conference!

Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual...
Read More
IFIS August 29, 2019
CYBER SECURITY INSURANCE

Is your cyber hygiene adequate?

Before you eat food at any restaurant, you mind about the hygiene of the place....
Read More
IFIS August 28, 2019
CYBER SECURITY

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE

The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users...
Read More
IFIS August 26, 2019
CYBER SECURITY TRAINING

Countering Cyber Attacks

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre...
Read More
Admin August 20, 2019
CYBER SECURITY

PHISHING, THE GREATEST FORM OF CYBER ATTACK

If you access the Internet or use WhatsApp, Email, Skype and any social media app,...
Read More
raymond August 19, 2019
COMPUTER SECURITY CYBER DEFENCE CYBER SECURITY

Why a career in cybersecurity? Part 2 lots of opportunities await

Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security...
Read More
raymond August 16, 2019
CYBER SECURITY

Why a career in cybersecurity? Part 1

Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security...
Read More
IFIS August 14, 2019
CYBER SECURITY

External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

On July 10, 2019, Bank of Uganda issued Instruction Circular ‘EDS.306.2 as a follow-up to...
Read More
IFIS August 13, 2019
CYBER SECURITY

We were lied to: we were trained not educated

Our teachers lied to us. Our parents lied to us. Our policymakers lied to us....
Read More
IFIS July 30, 2019
CAREER MANAGEMENT

Part 3: 10 reasons for a career in cybersecurity

8th: Career in cybersecurity offers fat pay cheques and high mobility Of what use is...
Read More
IFIS July 28, 2019
Blog CYBER SECURITY

10 reasons for a career in cybersecurity and forensics – Part 2

9th: Endless opportunities I got my first job at a time I was pursuing an...
Read More
IFIS July 27, 2019
CYBER SECURITY

10 reasons for a career in cyber security and forensics?

10th reason: Cyber security and forensics offers skills in high demand for your personal success...
Read More
IFIS July 26, 2019
CYBER SECURITY

A word to Users

Are you aware of what’s trending in the technology of mobiles today and the security...
Read More
raymond June 13, 2019
MOBILE SECURITY

Securing your devices

Man is not an island, and as such we seek to interact more and more...
Read More
IFIS May 28, 2019
COMPUTER SECURITY

Active Network Forensics Solution

The main challenge faced during computer related investigations is the lack of sufficient evidence to...
Read More
IFIS May 28, 2019
Blog

Is Employee Cyber Security Awareness Inevitable?

Gone are the times when our only security concern was making sure that our doors...
Read More
Admin May 28, 2019
COMPUTER SECURITY

How secure is your bank?

As an executive committee member, CEO or board member of a financial institution, you know...
Read More
IFIS May 16, 2019
Blog

Beyond patient safety and medical liability.

Risk management in healthcare comprises the clinical and administrative systems, processes, and reports employed to...
Read More
Admin April 30, 2019
FRAUD MANAGEMENT

Are you a WannaCry accomplice?

A simple network scanning following a client request; exposed several computers on the network vulnerable...
Read More
IFIS April 25, 2019
COMPUTER SECURITY

The role of Risk Champions in effective Risk Management

At the heart of any effective risk process are two common qualities of strong team...
Read More
Admin April 23, 2019
FRAUD MANAGEMENT

Cybersecurity BCP/DR Planning

The Institute of Forensics and ICT Security (IFIS) has been providing training to organizations in...
Read More
IFIS April 23, 2019
Blog

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR)

No company should get ready. It should stay ready. That way, there are no surprises....
Read More
IFIS April 15, 2019
Blog

The state of cybersecurity in Uganda

A discussion with Mustapha B. Mugisa, of www.mustaphamugisa.com. How safe are businesses/individuals online? Starting with...
Read More
IFIS April 12, 2019
Blog

The deadly insiders

The enemy within is deadlier than the one without. As a business leader or entrepreneur,...
Read More
IFIS March 28, 2019
Blog

Everyone is a potential fraudster. Here is why

For the last ten years, since Institute of Forensics and ICT Security (www.forensicsinstitute.org) started fraud...
Read More
IFIS March 19, 2019
FRAUD MANAGEMENT

Lawyers’ vs Internal Auditors’: why lawyers are miles ahead in value addition? Part 2

Although Internal Auditors talk about value delivery, the value they deliver is not easily visible...
Read More
IFIS March 11, 2019
CAREER MANAGEMENT

Banking sector: Reconsider your Business Continuity Strategy

Kenya recently suffered a terrible terrorist attack at the DusitD2 complex on Riverside Drive. This...
Read More
IFIS February 25, 2019
CAREER MANAGEMENT

Data Breaches: Are you a Victim?

Data Breaches: Are you a victim? In a world that is using the internet for...
Read More
IFIS February 18, 2019
COMPUTER SECURITY

Understanding your target audience and target market

Anyone owning a business has to know who is in their customer circle, but just...
Read More
IFIS February 12, 2019
CAREER MANAGEMENT

ATM Fraud and how to protecting your money against it

Protecting your money in the bank during this holiday season ATM Fraud and how bank...
Read More
IFIS December 7, 2018
Fraud Investigation and Examination

Writing an Expert Witness Report

A typical report will begin with a factual statement in which the parties are identified....
Read More
Admin November 26, 2018
Fraud Investigation and Examination

How to conduct Effective Internal Investigations

… How to conduct Effective Internal InvestigationsRead More »
Read More
Admin November 8, 2018
FRAUD MANAGEMENT

Cyber Security & Risk Managemrnt

#BeyondCyberSecurity Are you ready for the new era? Do you use a mobile device or...
Read More
IFIS October 8, 2018
TRAINING

CYBER SECURITY TRAINING FOR BANKS

The banking industry has increased the usage of digital channels such as internet banking, digital...
Read More
Admin September 13, 2018
TRAINING

Combating Cyber Security Threats

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre...
Read More
Admin September 11, 2018
COMPUTER SECURITY

The role of HR Function in Fraud Prevention and Detection

Although there is no one definition for fraud, the Collins English dictionary defines it as...
Read More
Admin September 11, 2018
FRAUD MANAGEMENT

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS

Fraudsters have figured out how to break in to online accounts protected by two-factor authentication...
Read More
Admin September 10, 2018
COMPUTER SECURITY

Fraud Risk Management: Awareness, prevention, detection and investigation

Awareness Bearing in mind that awareness of fraud risks can provide a business with protection,...
Read More
Admin September 7, 2018
FRAUD MANAGEMENT

The role of Risk Champions in effective Risk Management

At the heart of any effective risk process are two common qualities of strong team...
Read More
Admin September 6, 2018
FRAUD MANAGEMENT

Why Human Error is Your Biggest Cyber Security Vulnerability

It happens every single day—people open emails from unknown senders, click on mysterious links out...
Read More
Admin September 5, 2018
COMPUTER SECURITY

Charity fraud

Charity fraud, a type of fraud that occurs when charitable organizations that solicit funds from...
Read More
Admin August 22, 2018
FRAUD MANAGEMENT

Money Transfer Fraud Scams

Kenneth’s friend made decent money working as a mystery shopper. When Kenneth was contacted for...
Read More
Admin August 17, 2018
FRAUD MANAGEMENT

What is Computer Forensics?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence...
Read More
Admin August 14, 2018
COMPUTER SECURITY

How your Company can Recognize and Combat Cyber Crime

This is one of the most talked about topics in the media and in boardrooms...
Read More
Admin August 14, 2018
Blog

Fraud in Mobile Financial Services

The rapid growth of mobile financial services (MFS) has facilitated access to cheap and reliable...
Read More
Admin August 13, 2018
Blog

Risks in the Insurance Sector

Managing compliance risk is crucial in the challenging environment of the insurance industry. However, because...
Read More
Admin August 10, 2018
TRAINING

Cybercrime in Uganda

When it comes to Ugandans, there is a general feeling that Internet crime is an...
Read More
Admin August 10, 2018
COMPUTER SECURITY

What is a Financial Risk?

Financial risk is the possibility that shareholders or other financial stakeholders will lose money when...
Read More
Admin August 9, 2018
TRAINING

Evidence in Law

Evidence, in law, refers to any of the material items or assertions of fact that...
Read More
Admin July 16, 2018
TRAINING

Cloud Penetration Testing

Cloud is the preferred solution for data storage, infrastructure and services on demand today. Penetration testers and...
Read More
Admin July 4, 2018
COMPUTER SECURITY

How To Manage Risk

Risk is an uncertain event that occurs and can have a positive or negative impact...
Read More
Admin June 27, 2018
FRAUD MANAGEMENT

How to manage the risk of procurement fraud

Ensure the risk of procurement fraud is acknowledged on your company risk register, and there...
Read More
Admin June 25, 2018
FRAUD MANAGEMENT

What is Data Security

Data security refers to protective digital privacy measures that are applied to prevent unauthorized access...
Read More
Admin June 22, 2018
COMPUTER SECURITY

WHAT IS FRAUD?

According to the Association of Certified Fraud Examiners, fraud is defined as any intentional or...
Read More
Admin May 28, 2018
FRAUD MANAGEMENT

Why is Computer Forensics Important to your Organization?

In today’s fast paced world, organizations have to rely more and more heavily on technology...
Read More
Admin April 13, 2018
COMPUTER SECURITY

5 Risk Management Steps.

As a project manager or team member, you manage risk on a daily basis; it’s...
Read More
Admin March 23, 2018
TRAINING

What is Enterprise Risk Management?

Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities...
Read More
Admin March 9, 2018
TRAINING

How your partner or foes hack into your phone

It is a Monday morning. The alarm goes off. You raise your head and reach...
Read More
IFIS February 19, 2018
COMPUTER SECURITY

Beware of ATM skimming

This type of fraud occurs when an ATM is compromised by a skimming device, a...
Read More
Admin February 13, 2018
FRAUD MANAGEMENT

Types of Fraud in Business

Small businesses with less than 100 employees experience a median loss of $154,000 due to...
Read More
Admin February 5, 2018
FRAUD MANAGEMENT

What is Cyberbullying?

Cyber-bullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking  sites...
Read More
Admin January 29, 2018
COMPUTER SECURITY

Conducting Internal Investigations

Conducting an internal investigation can be a difficult task. An investigation into employee wrongdoing can...
Read More
Admin January 22, 2018
FRAUD MANAGEMENT

The best approach to stopping fraud and corruption at your workplace

The key deterrent of fraud and corruption is awareness and prevention. Some of the processes...
Read More
Admin January 10, 2018
FRAUD MANAGEMENT

Protecting your Business from Cyber extortion

In the shadowy world of security threats and bad actors, cyber extortion is a growing...
Read More
Admin December 7, 2017
COMPUTER SECURITY

Beware of Charity Fraud

Charity fraud is the act of using deception to get money from people who believe...
Read More
Admin December 5, 2017
FRAUD MANAGEMENT

Is your mobile banking security safe?

Managing your money has never been so easy. With the rise of mobile banking, paying...
Read More
Admin November 22, 2017
COMPUTER SECURITY

Conducting Forensic Accounting

A basic use of forensic accounting skills can enable an organization to take the proper...
Read More
Admin November 22, 2017
FRAUD MANAGEMENT

Insider threat and how to guard against it

Cyber crime has become a fact of life for businesses of all sizes. As the...
Read More
Admin November 16, 2017
FRAUD MANAGEMENT

Types of privileged accounts you need to know

Privileged accounts exist in many forms across an enterprise environment, and they pose significant security...
Read More
Admin November 10, 2017
COMPUTER SECURITY

When to Use Vulnerability Assessments, Pentesting, Red Teams, and Bug Bounties

There’s a lot of conversation taking place around the merits of penetration testing vs. bug...
Read More
Admin November 9, 2017
COMPUTER SECURITY

Are you a victim of asset misappropriation fraud?

Asset misappropriation fraud occurs when people who are entrusted to manage the assets of an...
Read More
Admin November 9, 2017
FRAUD MANAGEMENT

Tasks and Responsibilities of a Fraud Investigator

Document all investigations Prepare written reports of investigation results Prepare evidence for presentation in court...
Read More
Admin November 7, 2017
FRAUD MANAGEMENT

How to combat procurement fraud

Procurement fraud can wipe out much of a company’s profits and damage a nation’s ability...
Read More
Admin November 7, 2017
FRAUD MANAGEMENT

How to use background checks to protect company assets

Your corporate success relies on the people you bring on board.  It is important to...
Read More
Admin November 3, 2017
FRAUD MANAGEMENT

What does Software Security mean?

Software security is an idea implemented to protect software against malicious attack and other hacker...
Read More
Admin November 2, 2017
COMPUTER SECURITY

How to protect your computer from future cyber attacks

In light of the current cyber-attacks which have affected more than 200,000 people in over...
Read More
Admin October 26, 2017
COMPUTER SECURITY

Supermarket theft and fraud

When we discuss theft and fraud in the retail sector we quite often overlook the...
Read More
Admin September 14, 2017
FRAUD MANAGEMENT

The Purpose of Risk Management in Healthcare

Risks to patients, staff, and organizations are prevalent in healthcare. Thus, it is necessary for...
Read More
Admin August 17, 2017
TRAINING

Confidentiality at workplace

With today’s increasingly litigious and highly competitive workplace, confidentiality is important for a host of...
Read More
Admin August 16, 2017
FRAUD MANAGEMENT

Who is an expert witness?

Briefly, the expert witness is anyone with specialist knowledge not commonly held, or likely to...
Read More
Admin July 29, 2017
FRAUD MANAGEMENT TRAINING

Guarding against Phishing

The practice of sending out mass emails that are fraudulent in nature is referred to...
Read More
Admin July 28, 2017
FRAUD MANAGEMENT

How safe are you from email hijacking?

Once you possess an iPad, Debit/Visa card and use mobile banking, you are engaged in...
Read More
Admin July 25, 2017
COMPUTER SECURITY

Common types of financial fraud

Financial fraud is known as a deceptive white collar crime that can be devastating yet...
Read More
Admin July 24, 2017
FRAUD MANAGEMENT

Beware of malicious Soft Ware on your Computer.

Malware, short for malicious software, is a  term used to refer to a variety of...
Read More
Admin July 14, 2017
COMPUTER SECURITY

Why Simbox Fraud is difficult to deal with.

One of the most predominant frauds today is Interconnect Bypass Fraud or Simbox fraud as...
Read More
Admin July 13, 2017
FRAUD MANAGEMENT

Conducting Work place Investigations

Conducting workplace investigations is one of the most challenging duties that HR professionals must take...
Read More
Admin July 5, 2017
FRAUD MANAGEMENT

Bank security reviews

Banking has gone more electronic, it has become more vulnerable. Robbing a bank used to...
Read More
Admin July 4, 2017
FRAUD MANAGEMENT

Is a plea bargain inevitable?

Being arrested can be a terrifying, stressful, confusing experience. From that point forward, things can...
Read More
Admin June 20, 2017
FRAUD MANAGEMENT

Investigative Report Writing

When an investigation leads to a criminal or civil court case, the investigation report can...
Read More
Admin June 19, 2017
TRAINING

How safe is Network from Hackers?

Recent hacks on some of the world’s most sophisticated technology companies have showcased another kind...
Read More
Admin June 16, 2017
COMPUTER SECURITY

Why Mobile Forensics?

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence...
Read More
Admin June 15, 2017
COMPUTER SECURITY

Top Risks for Banks

Enterprise risk management has become a widely talked-about topic across the industry by both bankers...
Read More
Admin June 15, 2017
FRAUD MANAGEMENT

Procurement fraud and how to deal with it

The most cost-effective way to deal with fraud is to prevent it. A dishonest employee...
Read More
Admin June 14, 2017
FRAUD MANAGEMENT

Official Bribery

The act of giving money, goods or other forms of recompense to a recipient in...
Read More
Admin June 7, 2017
FRAUD MANAGEMENT

Managing Fraud in a Business.

All organizations are subject to fraud risks. Large frauds have led to the downfall of...
Read More
Admin June 7, 2017
FRAUD MANAGEMENT

Combating Fraud in your Business.

Employee fraud is a significant problem faced by organizations of all types, sizes, locations and...
Read More
Admin June 2, 2017
FRAUD MANAGEMENT

Transform your Business with Mobile Security

Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and...
Read More
Admin May 30, 2017
COMPUTER SECURITY

Church Fraud

One day hardly passes without an incidence of a fake pastor or a church fraud....
Read More
Admin May 29, 2017
FRAUD MANAGEMENT

How to use background checks to protect company assets

Your corporate success relies on the people you bring on board.  It is important to...
Read More
Admin May 29, 2017
CAREER MANAGEMENT

Occupational Fraud

With the economy struggling to find its foothold, many businesses and individuals are facing the...
Read More
Admin May 22, 2017
FRAUD MANAGEMENT

Cyber Crime

Cyber crime is a term that covers a broad scope of criminal activity using a...
Read More
Admin May 22, 2017
FRAUD MANAGEMENT

WANNACRYPT / wannacry: UPDATED BRIEFING

WHAT IS WANNACRYPT  ( Wanna C r y / Wcry) ? A new ransomware attack, perhaps...
Read More
IFIS May 16, 2017
COMPUTER SECURITY

Inside the Fraudster’s Mind

Understanding the thoughts and feelings of a fraudster can provide valuable insight to enhance an...
Read More
Admin May 12, 2017
FRAUD MANAGEMENT

Crime Scene Investigations

A crime scene is really an accumulation of things that is, when taken together and...
Read More
Admin April 13, 2017
FRAUD MANAGEMENT

Fraud Investigations

Fraud investigations begin with a meeting between the investigator and client. The person launching the...
Read More
Admin April 11, 2017
FRAUD MANAGEMENT

Get Certified Today! Become a Certified Security Analyst

You are an ethical hacker. In fact, you are a Certified Ethical Hacker. You dream...
Read More
Admin March 29, 2017
COMPUTER SECURITY

What are fraudulent financial reports and why do they exist?

Fraudulent financial reporting is a deliberate misstatement or omission of financial accounting information intended to...
Read More
Admin March 21, 2017
FRAUD MANAGEMENT

The Role of Board in Risk Management.

In the past years, boards could rely on management to oversee and manage risk. But...
Read More
Admin March 15, 2017
TRAINING

What is Cyber Crime?

Cyber crime, also called computer crime, is any illegal activity that involves a computer or...
Read More
Admin March 13, 2017
COMPUTER SECURITY

Risk Based Auditing

Audit risk is the risk that the financial statements are materially incorrect, even though the...
Read More
Admin March 9, 2017
FRAUD MANAGEMENT

Identity fraud vs identity theft

Identity theft Identity theft is when your personal details are stolen, this happens when fraudsters access...
Read More
Admin March 7, 2017
FRAUD MANAGEMENT

Biometrics

Authentication is the process of determining whether a person is who he or she claims...
Read More
Admin February 21, 2017
COMPUTER SECURITY

Enterprise Risk Management

Enterprise Risk Management is a strategic business discipline that supports the achievement of an organization's...
Read More
Admin February 21, 2017
TRAINING

Invest in learning about professional data recovery tools

A disaster recovery is a process or set of procedures to recover and protect a...
Read More
Admin February 17, 2017
COMPUTER SECURITY

Fraud in the Contract and Procurement Process

The rise in contract management and the outsourcing of goods and services has created an...
Read More
Admin February 16, 2017
FRAUD MANAGEMENT

What is Evidence?

Evidence is anything presented in support of an assertion. This support may be strong or...
Read More
Admin February 15, 2017
FRAUD MANAGEMENT

Forensics investigations in Uganda

Forensics investigations is a step by step tracing for dots in a digital equipment to...
Read More
Admin February 13, 2017
FRAUD MANAGEMENT

Document Fraud

Falsifying documents involves altering, changing or modifying a document for the purpose of deceiving another...
Read More
Admin February 13, 2017
FRAUD MANAGEMENT

How effective is Your Fraud Prevention Programme

One of the ways a company/Organization can prevent fraud is by setting up internal control...
Read More
IFIS February 2, 2017
FRAUD MANAGEMENT

Disguised Fraud

This is a case that involved a high level fraudster. The fraudster was an IT...
Read More
Admin February 2, 2017
FRAUD MANAGEMENT

Fraud at the workplace

Fraud is a serious problem for all organizations, whether they are corporations, limited liability companies,...
Read More
Admin January 27, 2017
FRAUD MANAGEMENT

5 things lawyers should know about Computer/Digital Forensics

Nowadays, the great majority of legal cases involve a digital component that, if properly uncovered...
Read More
IFIS January 27, 2017
FRAUD MANAGEMENT

Be Aware of Advance Fee Frauds.

Advance fee frauds ask for payment up front before the deal can go through. The...
Read More
Admin January 18, 2017
FRAUD MANAGEMENT

Intellectual property theft

Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expressions....
Read More
Admin January 16, 2017
FRAUD MANAGEMENT

Why forensics investigations fail in Uganda

 Why are they never conclusive enough in the courts of law? Forensics investigations is a...
Read More
Admin January 11, 2017
FRAUD MANAGEMENT

Become a Qualified Investigator

Criminal investigation involves the study of facts, used to identify, locate and prove the guilt...
Read More
IFIS January 11, 2017
CAREER MANAGEMENT

HOW BEST CAN YOU DEFEND YOUR NETWORK?

Organizational focus on cyber defense is more important than ever as cyber breaches have a...
Read More
IFIS December 7, 2016
COMPUTER SECURITY

HOW TO KEEP CHILDREN SAFE FROM CYBER THREATS

Now days many parents don’t have time to investigate what their children are doing on...
Read More
IFIS November 30, 2016
COMPUTER SECURITY

What is Risk Management?

Risk Management is the process of identifying, analyzing and responding to risk factors. Risk Management...
Read More
IFIS November 24, 2016
TRAINING

Shocking News on Fraud at Makerere University

It would be unreasonable to expect a student with the reading, writing and computing abilities...
Read More
IFIS November 9, 2016
FRAUD MANAGEMENT

Email fraud, Are you secure?

In 2013, two businessmen with various business operations in Kampala filed a case against a...
Read More
IFIS November 7, 2016
FRAUD MANAGEMENT

Certified Network Defender is a must have.

Certified Network Defender is a hands-on, instructor-led network security certification training program. It is a...
Read More
IFIS November 4, 2016
COMPUTER SECURITY

How to protect yourself from ATM fraud as a customer

Familiarize yourself with the ATM machines of your bank especially the card slot entry area....
Read More
IFIS November 3, 2016
FRAUD MANAGEMENT

What is Identity fraud and identity theft?

Identity theft is when your personal details are stolen and identity fraud is when those...
Read More
IFIS November 2, 2016
FRAUD MANAGEMENT

My Experience in Passing CFE Exam

The Journey of a thousand miles starts with a step In 2012, after I graduated...
Read More
IFIS September 22, 2016
CAREER MANAGEMENT

Telecom Fraud in Uganda

Every year when the telecom companies submit their financial statements, they are expected to give...
Read More
IFIS August 2, 2016
FRAUD MANAGEMENT

Social Network Era: How safe is your information assets

Below is the presentation I made at Infosec 2014 seminar on 20th August 2014 at...
Read More
IFIS January 28, 2014
COMPUTER SECURITY

Two reasons why you need computer security training

When it comes to personal security, how sure are you that you are not being...
Read More
IFIS January 26, 2014
COMPUTER SECURITY

Subscribe to Our Newsletters

Scroll to Top