New student deal: up to 40% off | Sign up now to get courses for as low as $230.0 each. New users only.

Menu

COMPUTER SECURITY

Are you a WannaCry accomplice?

A simple network scanning following a client request; exposed several computers on the network vulnerable to WannaCry attack. Unfortunately, the computer hygiene for most companies is poor. Staff are lazy. They don’t want to learn how to keep their computers secure. They are fast to connect to the Internet to access their social media accounts. …

Are you a WannaCry accomplice? Read More »

Data Breaches: Are you a Victim?

Data Breaches: Are you a victim? In a world that is using the internet for all sorts of activities, there are concerns that various users have about the cyber space and how data confidentiality is handled by the applications, websites and gadgets that we use on a day to day basis.

ifis_cybercrime

Combating Cyber Security Threats

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Combating Cyber Security Threats Read More »

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS

Fraudsters have figured out how to break in to online accounts protected by two-factor authentication where the authenticating device is your mobile phone. They don’t steal the phone; they simply hijack the phone number. This enables them to intercept those one-time verification codes sent to that mobile number by text, email, or phone call. Armed …

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS Read More »

Why Human Error is Your Biggest Cyber Security Vulnerability

It happens every single day—people open emails from unknown senders, click on mysterious links out of curiosity, and even print out sensitive information and leave it sitting on the printer. These actions certainly aren’t uncommon. But when they occur at your company, it’s a major problem for your business’s cyber security. In this day and …

Why Human Error is Your Biggest Cyber Security Vulnerability Read More »

What is Computer Forensics?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly …

What is Computer Forensics? Read More »

Cybercrime in Uganda

When it comes to Ugandans, there is a general feeling that Internet crime is an advanced type of crime that has not yet infiltrated the country. The happy-go-lucky nature of the Internet in which anybody publishes anything at any time poses a serious security threat for any nation.

Cloud Penetration Testing

Cloud is the preferred solution for data storage, infrastructure and services on demand today. Penetration testers and ethical hackers are increasingly being called upon to evaluate the security of cloud-based applications, services, and infrastructures. Such work is fraught with political and technical complexity. Penetration testing, the practice of testing a computer system, network, or hosted application to discover vulnerabilities that may …

Cloud Penetration Testing Read More »

What is Data Security

Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is an essential aspect of IT for organizations of every size and type. 5 Ways to Enhance Data Security Limit Data Access Most of the organizations give …

What is Data Security Read More »

Why is Computer Forensics Important to your Organization?

In today’s fast paced world, organizations have to rely more and more heavily on technology to remain competitive. Customers have come to expect organizations to have an online presence with professional looking websites, be able to respond quickly to online enquiries, have online chat functionality and have the ability to order online. Technology has become …

Why is Computer Forensics Important to your Organization? Read More »

Scroll to Top