Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told the story...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
In January 2023, we received a phone call from the CEO of a well-known logistics company. His voice carried the...
How Omundo stole money using ATM cards that were not his This case is about a man who tricked the...
Pornography is a silent pandemic. It claims one victim at a time. Thanks to the Internet, the problem is very...
The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
Smart devices are convenient, but they are also a hacker’s paradise. Your smart TV, speaker, and even refrigerator are potential...
“Your phone is your financial vault. Lose it carelessly, and you’re handing thieves an open door to your money.” Mobile...
“A good con doesn’t need to be clever it just needs a willing victim.” Every few years, a financial institution...
we specialize in bridging the gap between knowledge and application.
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd