Forensics and Cyber Security Newsletter
In this current generation, Digital information is everywhere – in our homes and businesses, our financial institutions, and our critical infrastructure. We use and store data via pervasive cloud computing, network applications, social media, and mobile devices, as well as in our computers and tablets.
This information often gets vulnerable to compromise– copying, modification, deletion, or disclosure – by malware, viruses, etc.
You need a good understanding of the issues and technologies underlying the protection of computer systems and data as part of expected due diligence. Get insights on how to protect your information assets through our monthly Forensics and Cyber security News letter
Find all our issues of Newsletters here
You cannot solve a problem by running from it. Yet, this is what most top honchos and senior IT managers in most businesses in Uganda are doing: refuse to accept that cybercrime is a problem that needs urgent attention.
This issue focuses on the third leg of the Fraud Triangle: Rationalisation
Rationalization is the third leg of the fraud triangle and is considered a necessary component of crime before it takes place. It is part of the motivation for the crime.
This issue focuses on the second leg of the Fraud Triangle: Opportunity.
A person will be tempted to commit crime if S/he perceives that they can do it without being caught. Employees will violate their trust in areas where they have general information and technical skills: Download Now
After witnessing the most expensive election, our economy has been left very thirsty with most government departments requesting for supplementary budgets many months remaining to the end of the financial year..