
It started like any other Monday. Overcast skies. Heavy traffic on Jinja Road. At 9:13 AM, the IT manager of...

It started like any other Monday. Overcast skies. Heavy traffic on Jinja Road. At 9:13 AM, the IT manager of...

It arrived at 8:47 AM. Subject line: “URGENT – Unpaid Invoice Attached.” To most people, it looked ordinary. To Susan,...

Kawempe, Kampala. February 2025. A junior IT officer at a logistics company is escorted out by security. He is been...

March 2025, Western Uganda. An accountant at a private university sat nervously across from our team at Summit Consulting Ltd....

Setting: A dusty, humming office in Lira District. A procurement officer leans over her computer and clicks “Shift + Delete.”...

USBs and betrayal: The small devices behind big data leaks They fit in your pocket. But they can sink an...

It is not the file you send. It is what is hidden inside it. Every time you share a document,...

Think you can trace digital footprints, uncover hidden evidence, or spot cybercrime like a pro? Take this quick but revealing...

The war room is an interesting place – you get to see everything in action. The iShield360 cybersecurity center monitors...

It all starts with a compromise It always begins with a password. In June 2024, a procurement officer at a...
we specialize in bridging the gap between knowledge and application.

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd