Part 3: 10 reasons for a career in cybersecurity

8th: Career in cybersecurity offers fat pay cheques and high mobility Of what use is a career specialization that does not bring money on the table? Any professional career guidance class will advise you to follow your heart (read passion) in your choice of a profession and make money doing it. A career is fulfilling …

Part 3: 10 reasons for a career in cybersecurity Read More »

Active Network Forensics Solution

The main challenge faced during computer related investigations is the lack of sufficient evidence to pin point which device on the network was used to perpetuate the crime. A computer network consists of devices each of which produces log files of its own. These devices include PCs, Servers, routers and firewalls. PC’s are a great …

Active Network Forensics Solution Read More »

How secure is your bank?

As an executive committee member, CEO or board member of a financial institution, you know one of the most critical assets in your control is the core banking application and other key servers like ATM switch / server, mobile and internet banking server, and security monitoring server, if any, that interact with it to deliver …

How secure is your bank? Read More »

Cybersecurity BCP/DR Planning

The Institute of Forensics and ICT Security (IFIS) has been providing training to organizations in setting up an effective Business Continuity and Disaster Recovery plan (BCP/DR) as an overall coverage for contingency planning. Experience has shown that organizations do not include procedures for handling a BCP/DR training and those organizations that had these plans, they …

Cybersecurity BCP/DR Planning Read More »

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR)

No company should get ready. It should stay ready. That way, there are no surprises. The case of fire at one of Toyota offices in Kampala that led to loss of a brand-new car worth over US $100,000 to fire is still. Indeed, many disasters have happened and caused some businesses to collapse altogether. The …

Role of the board in Business Continuity Planning and Disaster Recovery (BCM/ DR) Read More »

The state of cybersecurity in Uganda

A discussion with Mustapha B. Mugisa, of How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of …

The state of cybersecurity in Uganda Read More »

The deadly insiders

The enemy within is deadlier than the one without. As a business leader or entrepreneur, it is your business to keep a watch on the kind of activities staff conduct The issue Many current and former staff steal intellectual property. This makes the company less competitive. The easiest way to steal intellectual property is through …

The deadly insiders Read More »

Fraud in Mobile Financial Services

The rapid growth of mobile financial services (MFS) has facilitated access to cheap and reliable financial services to an ever increasing formerly unbanked population segment. Innovative mobile money services like M-Pesa in Kenya and Tanzania have grown into major payment services that move billions of dollars annually. Unfortunately, MFS have also rapidly become a conduit …

Fraud in Mobile Financial Services Read More »

Scroll to Top
You will be able to get all our weekly updates through the email you submit.