COMPUTER SECURITY

Children Online Safety Awareness Training

Master the art of how to use virtual learning platforms and social networks like WhatsApp safely Are you too secure to be hacked? As schools remain closed and embrace digital learning, hackers are leveraging the panic and confusion to transmit malware and break into computer networks. If you (parent) or any of your children have …

Children Online Safety Awareness Training Read More »

Mobile Gadgets And Work Computers Are Left Open To Attack

As of the fourth industrial revolution today, information is the most crucial and important asset to any organization. It is, for this reason, that information to any organization should be protected wherever it resides to protect any business against reputational risks and loss of money. Businesses are trying hard to keep their networks and devices …

Mobile Gadgets And Work Computers Are Left Open To Attack Read More »

#COVID19: Using TECHNOLOGY to collaborate – Recommended Tools and Winning Habits

Tuesday, June 2nd 2020, 12pm Register Here When was the last time you wondered how to eliminate barriers created by time and location against you and your team? To register for the upcoming webinar, Click Here With 42% of Uganda’s population having access to the internet today, going digital is critical for maintaining team cohesion. …

#COVID19: Using TECHNOLOGY to collaborate – Recommended Tools and Winning Habits Read More »

How to ensure safe work from Home Cyber-Hygiene

Looking at the array of technical countermeasures available to protect confidential data and computer systems has certainly expanded as compared to the last decade.  Most corporate IT departments now allocate a significant portion of their budgets to information security. What isn’t clear is whether systems are more secure as a result. It is now a …

How to ensure safe work from Home Cyber-Hygiene Read More »

PHISHING, THE GREATEST FORM OF CYBER ATTACK

If you access the Internet or use WhatsApp, Email, Skype and any social media app, you are vulnerable to phishing.  Derived from the fishing hook, phishing cyber-attack vector tricks victims into clicking on links that appear to come from genuine sources. In 2019, the phishing attack is projected to be one of the top schemes …

PHISHING, THE GREATEST FORM OF CYBER ATTACK Read More »

Securing your devices

Man is not an island, and as such we seek to interact more and more with each other. This has led to a level of intercommunication through the internet that hasn’t been seen before. According to ABI Research, there will be over 30 billion devices connected on the Internet by 2020. Today, our everyday devices …

Securing your devices Read More »

Are you a WannaCry accomplice?

A simple network scanning following a client request; exposed several computers on the network vulnerable to WannaCry attack. Unfortunately, the computer hygiene for most companies is poor. Staff are lazy. They don’t want to learn how to keep their computers secure. They are fast to connect to the Internet to access their social media accounts. …

Are you a WannaCry accomplice? Read More »

Data Breaches: Are you a Victim?

Data Breaches: Are you a victim? In a world that is using the internet for all sorts of activities, there are concerns that various users have about the cyber space and how data confidentiality is handled by the applications, websites and gadgets that we use on a day to day basis.

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.