COMPUTER SECURITY

Get Certified Today! Become a Certified Security Analyst

You are an ethical hacker. In fact, you are a Certified Ethical Hacker. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code. Is that enough? Can you become an industry accepted security …

Get Certified Today! Become a Certified Security Analyst Read More »

ifis_biometric

Biometrics

Authentication is the process of determining whether a person is who he or she claims to be. This process can occur in one of two ways. Verification asks “Is this the person who he or she claims?” and consists of a single comparison. Identification makes a one-to-N comparison and tries to determine if the person …

Biometrics Read More »

Invest in learning about professional data recovery tools

A disaster recovery is a process or set of procedures to recover and protect a business in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures an organization is to follow in the event of a disaster. Backups are useful primarily for two purposes: to restore a computer to …

Invest in learning about professional data recovery tools Read More »

HOW BEST CAN YOU DEFEND YOUR NETWORK?

Organizational focus on cyber defense is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore organizations must have, as part of their defense mechanisms, trained network defenders who are focused on protecting, …

HOW BEST CAN YOU DEFEND YOUR NETWORK? Read More »

HOW TO KEEP CHILDREN SAFE FROM CYBER THREATS

Now days many parents don’t have time to investigate what their children are doing on line which has in the end caused a lot of immorality in the sense that children practice what they see on the internet.  Cyber security awareness training programme is here to provide children with the necessary knowledge and skills to …

HOW TO KEEP CHILDREN SAFE FROM CYBER THREATS Read More »

Certified Network Defender is a must have.

Certified Network Defender is a hands-on, instructor-led network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cyber security education framework. Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore, organizations must have, as part of their defense mechanisms, trained network engineers who …

Certified Network Defender is a must have. Read More »

ifis_social

Social Network Era: How safe is your information assets

Below is the presentation I made at Infosec 2014 seminar on 20th August 2014 at Hotel Africana Kampala, about the risks posed by social media. This is a must read to improve your security online. My presentation verbatim: part 1. “How many of you know of a person who has ever died of a snake …

Social Network Era: How safe is your information assets Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.