
Last year, during a routine advisory assignment, I walked into a SACCO that believed it had strong cybersecurity. The board...

Last year, during a routine advisory assignment, I walked into a SACCO that believed it had strong cybersecurity. The board...

It started quietly as a finance officer at a local organisation logged into the accounting system late in the evening,...

It started with a routine system upgrade on a Thursday evening in the city. By Monday morning, three vendors had...

On a Tuesday morning, a mid-sized organisation in Kampala woke up to a quiet disaster. Money had not vanished dramatically,...

It was a Thursday evening. The kind of evening when the city exhales, traffic thins, and executives convince themselves that...

I learned the hard way on a quiet Tuesday morning when a finance director with a steady voice and tired...

What happened is not mysterious. Data left the system, and it moved faster than management reacted. Logs existed, but no...

What happened is simple. A system recorded activity that did not belong there. Data moved out of its normal path,...

Donor trust is currency. Lose it, and the organisation bleeds quietly, long before the scandal reaches the papers. What happened...

It starts with a screenshot. A neat Instagram shopfront with clean product photos. Delivery in 24 hours. A WhatsApp number...
we specialize in bridging the gap between knowledge and application.

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd