January – February 2022
Cybercrime is a constant business: Three business areas to watch out for! “Malicious attackers take advantage of the health crisis to craft targeted emails in
Cybercrime is a constant business: Three business areas to watch out for! “Malicious attackers take advantage of the health crisis to craft targeted emails in
Is your remote working secure? R emote-working (teleworking) is a must for several enterprises to survive in business today, following the COVID-19 pandemic crisis. There
Intellectual Property Protection One of the principal responsibilities of cybersecurity professionals is protecting the intellectual property belonging to their organizations from unofficial use or disclosure.
Featured Articles The Biggest Cybersecurity Targets Organizations have a number of digital assets that cybercriminals want. Mainly, they want money, but usually, they’ll take anything
Featured Articles Phishing Scams Of recent, phishing is becoming more common and more sophisticated. A recent Microsoft Security Intelligence Report states that phishing attacks are
Featured Articles The Unexpected cyber threats Online communication involves two people or organizations doing business through messages sent over an internet connection. The expectation is
Featured Articles Your Smartphone: Friend or Foe? How safe is your information and pictures? Have you ever paused to think what would happen in the
Are you secure online You cannot solve a problem by running from it. Yet, this is what most top honchos and senior IT managers in
Download and view the training calendar program for the year 2021. Intakes start in January 2021
In line with our strategy to support the fight against the everincreasing threat of cybercrime, effective 2018, Summit Consulting Ltd has launched the “FRONTLINE” project to streamline the act of security assessments.
In the digital age, the Internet has become an essential part of daily life, offering numerous opportunities for economic growth, communication, and innovation. However, it
Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues at hand. Everyone wants to
According to Gartner’s report on ‘Innovation Insight for Attack Surface Management (ASM)’, which covers the growing need faced by security teams to manage an expanding
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help organizations mitigate the prevailing attack
Application monitoring just like overall network monitoring is a vital IT function for corporate organizations. From employee productivity with the various applications to infrastructure maintenance,
In today’s complex environment, employees have access to corporate networks and are authenticated to corporate systems, as well as servers, and devices. It is dire
While technology has driven the digital agenda and led to greater innovation, growth, and efficiency; it also opens the road to potential security breaches and
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern in cybersecurity breaches, thus requiring
A dedicated team of staff are waiting to answer your inquiries.
Please submit an inquiry.
© All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd
There was a problem reporting this post.
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.