User Registration

Note: Your password will be generated automatically and sent to your email address.


In this current generation, Digital information is everywhere – in our homes and businesses, our financial institutions, and our critical infrastructure. We use and store data via pervasive cloud computing, network applications, social media, and mobile devices, as well as in our computers and tablets.

This information often gets vulnerable to compromise– copying, modification, deletion, or disclosure – by malware, viruses, etc.

You need a good understanding of the issues and technologies underlying the protection of computer systems and data as part of expected due diligence. Get insights on how to protect your information assets through our monthly Forensics and Cyber security News letter

Find all our issues of Newsletters here

Cyber threats: Are you secure?

Cybersecurity - what’s going to happen next? Everyone wants to know, and no one can know for certain, despite armies of analysts and datacenters of machine intelligence. As we enter the 2nd half of this year, it behooves the Institute of Forensics and ICT Security (IFIS) to alert you about the cyber-attacks that may happen before the end of the year.


Are you secure online

You cannot solve a problem by running from it. Yet, this is what most top honchos and senior IT managers in most businesses in Uganda are doing: refuse to accept that cybercrime is a problem that needs urgent attention.

Why the ever increasing fraud challenges in Uganda- Part3- Rationalization

This issue focuses on the third leg of the Fraud Triangle: Rationalisation Rationalization is the third leg of the fraud triangle and is considered a necessary component of crime before it takes place. It is part of the motivation for the crime.

Why the ever increasing fraud challenges in Uganda-Part 2

This issue focuses on the second leg of the Fraud Triangle: Opportunity. A person will be tempted to commit crime if S/he perceives that they can do it without being caught. Employees will violate their trust in areas where they have general information and technical skills:

Why the ever increasing fraud challenges in Uganda

After witnessing the most expensive election, our economy has been left very thirsty with most government departments requesting for supplementary budgets many months remaining to the end of the financial year..

Scroll to Top