
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...
It started with a link. One click. That’s all it took. On a cool Friday morning in April 2025, a...
Every time you click a suspicious link, share your email on a shady site, or use the same password across...
Welcome to the test that separates the cyber-savvy from the cyber-sloppy. You may think you’re safe. You don’t click on...
It started like any other Monday. Overcast skies. Heavy traffic on Jinja Road. At 9:13 AM, the IT manager of...
It arrived at 8:47 AM. Subject line: “URGENT – Unpaid Invoice Attached.” To most people, it looked ordinary. To Susan,...
Kawempe, Kampala. February 2025. A junior IT officer at a logistics company is escorted out by security. He is been...
Setting: A dusty, humming office in Lira District. A procurement officer leans over her computer and clicks “Shift + Delete.”...
The war room is an interesting place – you get to see everything in action. The iShield360 cybersecurity center monitors...
It all starts with a compromise It always begins with a password. In June 2024, a procurement officer at a...
we specialize in bridging the gap between knowledge and application.
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd