New student deal: up to 40% off | Sign up now to get courses for as low as $230.0 each. New users only.



Securing your devices

Man is not an island, and as such we seek to interact more and more with each other. This has led to a level of intercommunication through the internet that hasn’t been seen before. According to ABI Research, there will be over 30 billion devices connected on the Internet by 2020. Today, our everyday devices …

Securing your devices Read More »

Are you a WannaCry accomplice?

A simple network scanning following a client request; exposed several computers on the network vulnerable to WannaCry attack. Unfortunately, the computer hygiene for most companies is poor. Staff are lazy. They don’t want to learn how to keep their computers secure. They are fast to connect to the Internet to access their social media accounts. …

Are you a WannaCry accomplice? Read More »

Data Breaches: Are you a Victim?

Data Breaches: Are you a victim? In a world that is using the internet for all sorts of activities, there are concerns that various users have about the cyber space and how data confidentiality is handled by the applications, websites and gadgets that we use on a day to day basis.


Combating Cyber Security Threats

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Combating Cyber Security Threats Read More »


Fraudsters have figured out how to break in to online accounts protected by two-factor authentication where the authenticating device is your mobile phone. They don’t steal the phone; they simply hijack the phone number. This enables them to intercept those one-time verification codes sent to that mobile number by text, email, or phone call. Armed …


Why Human Error is Your Biggest Cyber Security Vulnerability

It happens every single day—people open emails from unknown senders, click on mysterious links out of curiosity, and even print out sensitive information and leave it sitting on the printer. These actions certainly aren’t uncommon. But when they occur at your company, it’s a major problem for your business’s cyber security. In this day and …

Why Human Error is Your Biggest Cyber Security Vulnerability Read More »

What is Computer Forensics?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly …

What is Computer Forensics? Read More »

Cybercrime in Uganda

When it comes to Ugandans, there is a general feeling that Internet crime is an advanced type of crime that has not yet infiltrated the country. The happy-go-lucky nature of the Internet in which anybody publishes anything at any time poses a serious security threat for any nation.

Cloud Penetration Testing

Cloud is the preferred solution for data storage, infrastructure and services on demand today. Penetration testers and ethical hackers are increasingly being called upon to evaluate the security of cloud-based applications, services, and infrastructures. Such work is fraught with political and technical complexity. Penetration testing, the practice of testing a computer system, network, or hosted application to discover vulnerabilities that may …

Cloud Penetration Testing Read More »

Subscribe to Our Newsletters

Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
None of our operators are available at the moment. Please, leave your details and we will get back to you shortly. Include your phone number in the message
Our operators are busy. Please try again later
Have you got question? Write to us!
Thank you for chatting with us. Please contact us anytime you have a question
Was this conversation useful? Vote this chat session.
Good Bad
Scroll to Top