COMPUTER SECURITY

#COVID19: Using TECHNOLOGY to collaborate – Recommended Tools and Winning Habits

Tuesday, June 2nd 2020, 12pm Register Here When was the last time you wondered how to eliminate barriers created by time and location against you and your team? To register for the upcoming webinar, Click Here With 42% of Uganda’s population having access to the internet today, going digital is critical for maintaining team cohesion. …

#COVID19: Using TECHNOLOGY to collaborate – Recommended Tools and Winning Habits Read More »

How to ensure safe work from Home Cyber-Hygiene

Looking at the array of technical countermeasures available to protect confidential data and computer systems has certainly expanded as compared to the last decade.  Most corporate IT departments now allocate a significant portion of their budgets to information security. What isn’t clear is whether systems are more secure as a result. It is now a …

How to ensure safe work from Home Cyber-Hygiene Read More »

PHISHING, THE GREATEST FORM OF CYBER ATTACK

If you access the Internet or use WhatsApp, Email, Skype and any social media app, you are vulnerable to phishing.  Derived from the fishing hook, phishing cyber-attack vector tricks victims into clicking on links that appear to come from genuine sources. In 2019, the phishing attack is projected to be one of the top schemes …

PHISHING, THE GREATEST FORM OF CYBER ATTACK Read More »

Securing your devices

Man is not an island, and as such we seek to interact more and more with each other. This has led to a level of intercommunication through the internet that hasn’t been seen before. According to ABI Research, there will be over 30 billion devices connected on the Internet by 2020. Today, our everyday devices …

Securing your devices Read More »

Are you a WannaCry accomplice?

A simple network scanning following a client request; exposed several computers on the network vulnerable to WannaCry attack. Unfortunately, the computer hygiene for most companies is poor. Staff are lazy. They don’t want to learn how to keep their computers secure. They are fast to connect to the Internet to access their social media accounts. …

Are you a WannaCry accomplice? Read More »

Data Breaches: Are you a Victim?

Data Breaches: Are you a victim? In a world that is using the internet for all sorts of activities, there are concerns that various users have about the cyber space and how data confidentiality is handled by the applications, websites and gadgets that we use on a day to day basis.

ifis_cybercrime

Combating Cyber Security Threats

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Combating Cyber Security Threats Read More »

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS

Fraudsters have figured out how to break in to online accounts protected by two-factor authentication where the authenticating device is your mobile phone. They don’t steal the phone; they simply hijack the phone number. This enables them to intercept those one-time verification codes sent to that mobile number by text, email, or phone call. Armed …

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.