CYBER SECURITY

Cybersecurity Incident Response Planning

As the number of cyber breaches occurring worldwide increases, a number of companies have invested a lot of money in system hardening, user awareness, intrusion detection systems and other technologies to prevent data breaches. BUT is that enough? Even with all the various systems and controls in place, a company can still suffer a significant …

Cybersecurity Incident Response Planning Read More »

Cybersecurity: Safeguarding data

First Appeared in TODAY’S Accountant The Magazine for The Institute of Certified Public Accountants of Uganda (ICPAU) ISSUE 19, AUGUST 2019 pg. 44 He posted a WhatsApp message to a lady friend: “Here is the company’s payroll. Treat as confidential. Love you!” The lady immediately forwarded to another friend. “These guys are ripping us off. UGX 50m net for one …

Cybersecurity: Safeguarding data Read More »

Why Insurance players MUST attend the Cybersec conference!

Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual cybersecurity and risk management conference? A: Insurance sells a promise and relies on trust. The industry has also undergone a tremendous change in the way the business is conducted from risk assessment and underwriting to onboarding, service delivery, and on-going …

Why Insurance players MUST attend the Cybersec conference! Read More »

PROTECT YOUR ONLINE REPUTATION BY ATTENDING THE 3RD ANNUAL CYBERSECURITY & RISK MANAGEMENT CONFERENCE 2019

Why attend the #CSRM19? Are you too secure to be hacked? If you or any of your team member has Internet access or use social networks like WhatsApp, Email, Skype to mention but three, you are vulnerable to cyber-attacks if you connect through the same network! Jane (not real name), a 24-year-old dark-skinned lady was excited …

PROTECT YOUR ONLINE REPUTATION BY ATTENDING THE 3RD ANNUAL CYBERSECURITY & RISK MANAGEMENT CONFERENCE 2019 Read More »

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE

The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses Shs 122bn annually to cyber-attacks and it is further stated that the increase in the cost of cybercrime in the country is due to the increased sophistication of local cyber …

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE Read More »

Countering Cyber Attacks

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Countering Cyber Attacks Read More »

PHISHING, THE GREATEST FORM OF CYBER ATTACK

If you access the Internet or use WhatsApp, Email, Skype and any social media app, you are vulnerable to phishing.  Derived from the fishing hook, phishing cyber-attack vector tricks victims into clicking on links that appear to come from genuine sources. In 2019, the phishing attack is projected to be one of the top schemes …

PHISHING, THE GREATEST FORM OF CYBER ATTACK Read More »

Why a career in cybersecurity? Part 2 lots of opportunities await

Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa. A career in cybersecurity offers unlimited opportunities across industries and countries. So who needs a cybersecurity professional? Anyone who holds data needs cybersecurity professional. When you have something valuable at …

Why a career in cybersecurity? Part 2 lots of opportunities await Read More »

Why a career in cybersecurity? Part 1

Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa. A career in cybersecurity offers unlimited opportunities across industries and countries. Governments and multinational companies alike have open opportunities for expert cybersecurity researchers, bug hunters and true professionals who don’t …

Why a career in cybersecurity? Part 1 Read More »

Subscribe to Our Newsletters

Scroll to Top