MALWARE ON THE RISE: REINFORCE AWARENESS
More often than not, hackers are working around the clock to breach systems with a multitude of social engineering techniques and malware. Attackers are using…
More often than not, hackers are working around the clock to breach systems with a multitude of social engineering techniques and malware. Attackers are using…
As the number of cyber breaches occurring worldwide increases, a number of companies have invested a lot of money in system hardening, user awareness, intrusion…
First Appeared in TODAY’S Accountant The Magazine for The Institute of Certified Public Accountants of Uganda (ICPAU) ISSUE 19, AUGUST 2019 pg. 44 He posted a WhatsApp message…
Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual cybersecurity and risk management conference? A: Insurance sells a promise…
Before you eat food at any restaurant, you mind about the hygiene of the place. This saves you from some diseases. When it comes to…
Why attend the #CSRM19? Are you too secure to be hacked? If you or any of your team member has Internet access or use social…
The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses…
New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they…
If you access the Internet or use WhatsApp, Email, Skype and any social media app, you are vulnerable to phishing. Derived from the fishing hook,…
Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa.…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.