The forgotten cheques –a case of fraud or strategic deception?
Mr Strategy’s Memo on fraud risk Have you ever been accused of a crime you never committed? Imagine waking up to a letter demanding that…
<%= domainName %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_title %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_description %>
Mr Strategy’s Memo on fraud risk Have you ever been accused of a crime you never committed? Imagine waking up to a letter demanding that…
There’s a pervasive myth in boardrooms and IT departments alike: that with enough investment, training, and fancy software, a company can be 100% secure. The…
Every fraud starts as a ‘necessary adjustment.’ Then it becomes a habit. Then it becomes the business model. Carter’s, a beloved name in children’s apparel,…
Every company has its secrets. Undue enrichment is usually part of them. Stories about a top honcho who stole large sums of money through his…
In an era where financial transactions are becoming increasingly complex and digital, fraud has evolved into one of the most dangerous and costly threats to…
“Cybersecurity is not just an IT issue; it is a business risk that demands strategic alignment from the top down.” In the digital landscape, cyber…
In the overcrowded world of cybersecurity certifications, everyone is chasing acronyms you know several. They look good on a LinkedIn profile but let’s face it…
Umoja SACCO, a mid-sized financial cooperative with 15,000 members, faced growing cybersecurity threats as it digitized its services. It needed a Security Operations Center (SOC)…
Dear Executive Team, Cybersecurity doesn’t have to mean writing a blank check. The conventional wisdom screams for bloated Security Operations Centers (SOCs) brimming with overpriced…
In the digital age, the Internet has become an essential part of daily life, offering numerous opportunities for economic growth, communication, and innovation. However, it…
Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues at hand. Everyone wants to…
According to Gartner’s report on ‘Innovation Insight for Attack Surface Management (ASM)’, which covers the growing need faced by security teams to manage an expanding…
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help organizations mitigate the prevailing attack…
Application monitoring just like overall network monitoring is a vital IT function for corporate organizations. From employee productivity with the various applications to infrastructure maintenance,…
In today’s complex environment, employees have access to corporate networks and are authenticated to corporate systems, as well as servers, and devices. It is dire…
While technology has driven the digital agenda and led to greater innovation, growth, and efficiency; it also opens the road to potential security breaches and…
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern in cybersecurity breaches, thus requiring…
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of the company. The statistics regarding…
Organisations in the digital ecosystem spend millions trying to establish controls around their corporate networks from data breaches. This to a great extent does not…
Protecting company data, sensitive and high priority information, corporate networks, software, company equipment, and personnel is what makes physical security. Physical Security is affected by…
Did you know that 99.7% of applications have at least one vulnerability! Findings from Verizon’s 2020 Data Breach Investigations Report show that malicious attackers take…
In this digital generation, the great shift to mobile devices and technology adoption has tremendously changed our mode of interaction. How we use these devices…
In the good old days, before COVID19, the easiest way to keep children from online dangers was to not give them Internet access. As someone…
What do you think is the number one mistake many fraud examiners, investigators and other governance champions make? The number one mistake is not something…
The threat actors have not only grown in numbers but have also become more sophisticated. They have mastered speed, precision, and agility in their endeavours…
Have you or your organization been a victim of a cyber incident or experienced a data breach? What kind of breach did you encounter? Did…
“Managing third-party vendor cyber risk is fast becoming the defining cybersecurity challenge of our time.” In the current corporate enterprise, any ICT supply chain is…
As organizations traverse the setbacks brought about by COVID-19 and the need to stop its vast spread, many have resorted to a routine of working…
“Dear Mr. Justin Williams, I’m Vikas Manjit Singh from Punjab (India). I belong to a city named Ludhiana. Mr. Williams, I am having a brother…
Given the current situation of the continued existence of the pandemic. Millions of employees continue to work from home to fulfill their work obligations and…
When Jane received a brand-new laptop and a smartphone as part of her home working package, she was elated. “Every crisis comes with a silver…
As technology takes shape, more applications are cropping up, more social network forums, more devices that require me to sign in for me to access…
As the saying goes “you’re not hurt and care less about what you don’t know”. Over time you may wonder how secrets between two people…
In a digitally more connected world today, intrusions have consistently scaled. The outcomes from these intrusions have contributed to financial loss where those intrusions have…
Many of today’s enterprise IT environments are linked to multiple vendors and other interconnected devices to optimize business operations. However, the corporate network’s security is…
Why information security policies? As so many organizations (SMEs and Large enterprises) adopt technology in their daily operations, shifting from data-driven decision-making to cloud adoption,…
Given the tremendous growth of cyber threats today has not only caused an impact on personal data but also boosted the rise of the cost…
The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines…
Cybersecurity analysts can only secure a network when they have good situational awareness of the systems and devices on that network. Nmap, short for “Network…
System administrators, developers, IT support people, and power users all find Secure Shell (SSH) a very useful protocol for connecting to systems remotely over a…
What’s your worst cyber nightmare? What is your plan to prevent this and should something happen, mitigate it? Have you heard of something called cyber…
Master the art of how to use virtual learning platforms and social networks like WhatsApp safely Are you too secure to be hacked? As schools…
As of the fourth industrial revolution today, information is the most crucial and important asset to any organization. It is, for this reason, that information…
The advantage of competitive games especially football is they keep score. At any time during the match, you can look at the scoreboard and know…
Several Twitter accounts of high-profile people and companies were hacked on Wednesday 15th July 2020, throwing Twitter in the unwanted spotlight. This was a high-level…
As the reality of the economic impact of coronavirus sinks in, you need to explore cost-cutting alternatives. As part of the #coronavirus recovery strategy, leaders…
Penetration testing is done in different ways, apart from other penetration testing processes, Social Engineering is one of the fundamental techniques and methodologies that is…
Your data is valuable and should belong to you!! But what guarantee do you have that your online records are owned, accessed, and or reviewed…
Today, June 3rd, we celebrate the Uganda Martyrs. The people who paid the ultimate price in defense of their Christian beliefs. Fearing the possible loss…
Are you adding value as an internal auditor or you are just ticking and bashing and getting lost in the paperwork? In these pandemic times,…
Tuesday, June 2nd 2020, 12pm Register Here When was the last time you wondered how to eliminate barriers created by time and location against you…
Are you winning or losing during this crisis? Before we go deep, use two minutes to complete a brief survey to help you fine-tune…
Start: Tuesday, May 26, 2020 12:00 PM Meeting ID: 965 7979 5276 Password: Summit [* the S is Capital] Are you winning or losing at…
KAMPALA – 1st May 2020. Summit Consulting Ltd, summitcl.com, a professional services firm offering proactive forensics and fraud management services, corporate strategy, and risk advisory…
Criminals attack when they are least expected. As you go about your business, someone somewhere is hatching a plan to steal from you. You must…
Looking at the array of technical countermeasures available to protect confidential data and computer systems has certainly expanded as compared to the last decade. Most…
Effective leadership is the difference between business success and failure. Some leaders are already adjusting their financial forecasts to take into account the potential impact…
Are you worried about the impact of Covid19 to your business or organization? No one could have anticipated a pandemic in early 2020 that could…
In the realm of this fourth industrial revolution, the security of our accounts starts with the creators/owners of the accounts. In many data breaches that…
How to protect from the Cyber Risks created by technology providers with the use of mobile and patient portals. It has been noticed from various…
Public Wi-Fi is found most popular in public places like airports, coffee shops, malls, restaurants, and hotels. It allows everyone that is short of their…
As technology takes on a high trend in the fourth industrial revolution, a yet-coming world that will take on the next edge, almost entirely digitized…
Humankind, not computers, are the pivot region for computer threats. As predators (hackers) victimize others for their gain, access to secure networks is given to…
In the realm of technology comes the digital devices in the fourth industrial revolution. All electronic devices that have access to the internet and that…
Your device is at risk!!, your network is at risk! it’s all over the news, it is said every day, researchers and security officers lament…
More often than not, corporate emails stand the risk of a sophisticated scam. What exactly does the hacker aim at? Business Email Compromise is a…
According to the prevailing security inequities and technology advancements, personal and corporate privacy has continuously eroded as cyber-attacks and data breaches become a daily issue…
Formjacking is a new invisible threat in cyberspace today. The term “Formjacking” is a combination of “online/website form” and “hijacking”. This term brings about the…
I.T professionals are always responsible for ensuring that the data on the systems they manage is safe beyond a reasonable doubt from the risk of…
I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in…
One of the principal responsibilities of cybersecurity professionals is protecting the intellectual property belonging to their organizations from unofficial use or disclosure. This disclosure can…
It is common knowledge that data is one of the most vital assets for any organization. And as such, many laws that impact information security…
The Cybersecurity and Risk Management Conference 2019, with the theme “Big Data in Cybersecurity” is the latest milestone in a series of events held by…
It has often been argued as to what the most critical asset for an organization is. Of all the assets mainly associated with business success,…
As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T…
As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious…
Recently, A 23-year-old hacker from Utah who launched a series of DDoS attacks against multiple online services, websites, and online gaming companies between December 2013…
From ages past, there has always been the calamitous possibility for a colleague to be shockingly revealed as the ‘wolf in sheep’s clothing’, and we…
Every day, employees hear the same things from their IT staff about cybersecurity and safety. Though they may pushy and monotonous, there are very important…
More often than not, hackers are working around the clock to breach systems with a multitude of social engineering techniques and malware. Attackers are using…
As the number of cyber breaches occurring worldwide increases, a number of companies have invested a lot of money in system hardening, user awareness, intrusion…
First Appeared in TODAY’S Accountant The Magazine for The Institute of Certified Public Accountants of Uganda (ICPAU) ISSUE 19, AUGUST 2019 pg. 44 He posted a WhatsApp message…
Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual cybersecurity and risk management conference? A: Insurance sells a promise…
Before you eat food at any restaurant, you mind about the hygiene of the place. This saves you from some diseases. When it comes to…
Why attend the #CSRM19? Are you too secure to be hacked? If you or any of your team member has Internet access or use social…
The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses…
New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they…
If you access the Internet or use WhatsApp, Email, Skype and any social media app, you are vulnerable to phishing. Derived from the fishing hook,…
Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa.…
Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa.…
On July 10, 2019, Bank of Uganda issued Instruction Circular ‘EDS.306.2 as a follow-up to circular Ref: EDS.306.2 dated July 13, 2017, with respect to…
Our teachers lied to us. Our parents lied to us. Our policymakers lied to us. Our government lied to us. We were trained, not educated.…
8th: Career in cybersecurity offers fat pay cheques and high mobility Of what use is a career specialization that does not bring money on the…
9th: Endless opportunities I got my first job at a time I was pursuing an accountancy qualification. My job performance indicators were a number of…
Are you aware of what’s trending in the technology of mobiles today and the security niches that arise out of lack of knowledge on what…
Man is not an island, and as such we seek to interact more and more with each other. This has led to a level of…
The main challenge faced during computer related investigations is the lack of sufficient evidence to pin point which device on the network was used to…
Gone are the times when our only security concern was making sure that our doors and windows were locked. Due to rise in technology and…
As an executive committee member, CEO or board member of a financial institution, you know one of the most critical assets in your control is…
A dedicated team of staff are waiting to answer your inquiries.
Please submit an inquiry.
© All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd
There was a problem reporting this post.
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.