In this current generation, Digital information is everywhere – in our homes and businesses, our financial institutions, and our critical infrastructure. We use and store data via pervasive cloud computing, network applications, social media, and mobile devices, as well as in our computers and tablets.

This information often gets vulnerable to compromise– copying, modification, deletion, or disclosure – by malware, viruses, etc.

You need a good understanding of the issues and technologies underlying the protection of computer systems and data as part of expected due diligence. Get insights on how to protect your information assets through our monthly Forensics and Cyber security News letter

Find all our issues of Newsletters here

The Biggest Cybersecurity Targets:

Senior Executives
Organizations have a number of digital assets that cybercriminals want. Mainly, they want money, but usually, they’ll take anything they can get, and that can be confidential information.......
This Newsletter also covers Understanding DoS and DDoS Attacks therefore download it to find out more

Phishing Scams:

Phisher men are closer than they appear
Of recent, phishing is becoming more common and more sophisticated. A recent Microsoft Security Intelligence Report states that phishing attacks are by far the most frequent threat to cybersecurity.......
This article also covers Securing your devices therefore download it to find out more

The Unexpected cyber threats:

Man-in-the-Middle Attacks
Online communication involves two people or organizations doing business through messages sent over an internet connection. The expectation is that nobody is listening to the traffic on that connection. And messages are encrypted so that interceptors...... This article also covers Cybersecurity BCP/DR Planning therefore download it to find out more

Your Smartphone: Friend or Foe?

How safe is your information and pictures? Have you ever paused to think what would happen in the event that your phone got hacked? Or lost and the information on it accessed? Those handheld gadgets that take up a big percentage of most peoples’ lives providing access to entertainment, communication, health information, commercial services, among others are more of a threat to you than you can ever

Cyber threats: Are you secure?

Cybersecurity - what’s going to happen next? Everyone wants to know, and no one can know for certain, despite armies of analysts and datacenters of machine intelligence. As we enter the 2nd half of this year, it behooves the Institute of Forensics and ICT Security (IFIS) to alert you about the cyber-attacks that may happen before the end of the year.


Are you secure online

You cannot solve a problem by running from it. Yet, this is what most top honchos and senior IT managers in most businesses in Uganda are doing: refuse to accept that cybercrime is a problem that needs urgent attention.

Why the ever increasing fraud challenges in Uganda- Part3- Rationalization

This issue focuses on the third leg of the Fraud Triangle: Rationalisation Rationalization is the third leg of the fraud triangle and is considered a necessary component of crime before it takes place. It is part of the motivation for the crime.

Why the ever increasing fraud challenges in Uganda-Part 2

This issue focuses on the second leg of the Fraud Triangle: Opportunity. A person will be tempted to commit crime if S/he perceives that they can do it without being caught. Employees will violate their trust in areas where they have general information and technical skills:

Why the ever increasing fraud challenges in Uganda

After witnessing the most expensive election, our economy has been left very thirsty with most government departments requesting for supplementary budgets many months remaining to the end of the financial year..

Subscribe to Our Newsletters

Scroll to Top