Third-Party Software – a Security menace

Your device is at risk!!, your network is at risk! it’s all over the news, it is said every day, researchers and security officers lament over it every time, the question arises what is the computer security risk towards third-party software and what is the way forward? Security is most effective when practiced proactively, not …

Third-Party Software – a Security menace Read More »

Business Email Compromise

More often than not, corporate emails stand the risk of a sophisticated scam. What exactly does the hacker aim at? Business Email Compromise is a fraudulent scheme that targets both business and individual emails of an organization through social engineering or computer intrusion to extract personally identifiable information and sensitive data. According to the Federal …

Business Email Compromise Read More »

Formjacking a menace in Cyberspace

Formjacking is a new invisible threat in cyberspace today. The term “Formjacking” is a combination of “online/website form” and “hijacking”. This term brings about the digital version of the well-known skimming by cybercriminals. Like it sounds, this kind of threat involves a cybercriminal taking over forms on websites by exploiting their security weaknesses. Cybercriminals use …

Formjacking a menace in Cyberspace Read More »

I.T Security Controls

I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in place to address security risks. A security control can also be defined as an action, a mechanism that we apply to our I.T. infrastructure to either to protect our systems …

I.T Security Controls Read More »

Intellectual Property Protection

One of the principal responsibilities of cybersecurity professionals is protecting the intellectual property belonging to their organizations from unofficial use or disclosure. This disclosure can potentially be damaging especially if it is acquired by the competitor There are very many ways cybersecurity professionals protect this intellect property. Usually its by access control, encryption, hashing, among …

Intellectual Property Protection Read More »

Data Privacy and Compliance in Uganda

It is common knowledge that data is one of the most vital assets for any organization. And as such, many laws that impact information security have been established to protect the privacy of individuals and shield individuals against both identity theft and the undesirable disclosure of personal information. All over the continent, various countries have …

Data Privacy and Compliance in Uganda Read More »

Annual IFIS cybersecurity event an eye-opener

The Cybersecurity and Risk Management Conference 2019, with the theme “Big Data in Cybersecurity” is the latest milestone in a series of events held by the Institute of Forensics and ICT Security (IFIS) on the 16th – 18th October 2019 at Imperial Royale Hotel in Kampala. In this year’s edition, IFIS strategically partnered with the …

Annual IFIS cybersecurity event an eye-opener Read More »

Protecting your Critical Assets: Your Data

It has often been argued as to what the most critical asset for an organization is. Of all the assets mainly associated with business success, these two stand out namely; Human Assets and data. Its common knowledge among many leaders that the human asset is the key intangible asset for any organization. In today’s dynamic …

Protecting your Critical Assets: Your Data Read More »

Are you an effective Cybersecurity/ I.T Manager?

As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T Manager) to help fast track the process. These professionals when hired most of the time forget the primary role of the business. It’s imperative that security professionals remember that they …

Are you an effective Cybersecurity/ I.T Manager? Read More »

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information, …

Healthcare Cybersecurity: Are your medical records safe? Read More »

Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
None of our operators are available at the moment. Please, leave your details and we will get back to you shortly.
Our operators are busy. Please try again later
Have you got question? Write to us!
Thank you for chatting with us. Please contact us anytime you have a question
Was this conversation useful? Vote this chat session.
Good Bad
Scroll to Top
You will be able to get all our weekly updates through the email you submit.