CYBER SECURITY

Intellectual Property Protection

One of the principal responsibilities of cybersecurity professionals is protecting the intellectual property belonging to their organizations from unofficial use or disclosure. This disclosure can potentially be damaging especially if it is acquired by the competitor There are very many ways cybersecurity professionals protect this intellect property. Usually its by access control, encryption, hashing, among …

Intellectual Property Protection Read More »

Data Privacy and Compliance in Uganda

It is common knowledge that data is one of the most vital assets for any organization. And as such, many laws that impact information security have been established to protect the privacy of individuals and shield individuals against both identity theft and the undesirable disclosure of personal information. All over the continent, various countries have …

Data Privacy and Compliance in Uganda Read More »

Annual IFIS cybersecurity event an eye-opener

The Cybersecurity and Risk Management Conference 2019, with the theme “Big Data in Cybersecurity” is the latest milestone in a series of events held by the Institute of Forensics and ICT Security (IFIS) on the 16th – 18th October 2019 at Imperial Royale Hotel in Kampala. In this year’s edition, IFIS strategically partnered with the …

Annual IFIS cybersecurity event an eye-opener Read More »

Protecting your Critical Assets: Your Data

It has often been argued as to what the most critical asset for an organization is. Of all the assets mainly associated with business success, these two stand out namely; Human Assets and data. Its common knowledge among many leaders that the human asset is the key intangible asset for any organization. In today’s dynamic …

Protecting your Critical Assets: Your Data Read More »

Are you an effective Cybersecurity/ I.T Manager?

As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T Manager) to help fast track the process. These professionals when hired most of the time forget the primary role of the business. It’s imperative that security professionals remember that they …

Are you an effective Cybersecurity/ I.T Manager? Read More »

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information, …

Healthcare Cybersecurity: Are your medical records safe? Read More »

Understanding DoS and DDoS Attacks

Recently, A 23-year-old hacker from Utah who launched a series of DDoS attacks against multiple online services, websites, and online gaming companies between December 2013 and January 2014 was sentenced to 27 months in prison. Austin Thompson, a.k.a. “DerpTroll,” pledged guilty back in November 2018 after he admitted to being a part of DerpTrolling, a …

Understanding DoS and DDoS Attacks Read More »

Insider Cybersecurity Threats: Stay Vigilant

From ages past, there has always been the calamitous possibility for a colleague to be shockingly revealed as the ‘wolf in sheep’s clothing’, and we can credibly learn from sacred scripture that this will certainly not change even in the present day. So why need be wary of the wolf? Well, the biggest mistake you …

Insider Cybersecurity Threats: Stay Vigilant Read More »

Easy Cyber hygiene practices to keep you Safer

Every day, employees hear the same things from their IT staff about cybersecurity and safety. Though they may pushy and monotonous, there are very important reasons and rationale behind these practices and advice. Keeping safe and secure while connected isn’t just about how your system is set up – it is also very much about …

Easy Cyber hygiene practices to keep you Safer Read More »

MALWARE ON THE RISE: REINFORCE AWARENESS

More often than not, hackers are working around the clock to breach systems with a multitude of social engineering techniques and malware. Attackers are using malware to encrypt computer files and demand ransom to make them accessible again. People are typically the weakest link, and because an organization relies heavily on its human resources, due …

MALWARE ON THE RISE: REINFORCE AWARENESS Read More »

Subscribe to Our Newsletters

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.