I.T Security Controls
CYBER SECURITY

I.T Security Controls

I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in place to address security risks. A security control can also be defined as an action, a mechanism that we apply to our I.T. infrastructure to either to protect our systems…

Healthcare Cybersecurity: Are your medical records safe?
CYBER DEFENCE | CYBER SECURITY

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information,…

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE
CYBER SECURITY | TRAINING

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE

The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses Shs 122bn annually to cyber-attacks and it is further stated that the increase in the cost of cybercrime in the country is due to the increased sophistication of local cyber…