
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help...
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help...
According to Gartner’s report on ‘Innovation Insight for Attack Surface Management (ASM)’, which covers the growing need faced by security...
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...
It started with a link. One click. That’s all it took. On a cool Friday morning in April 2025, a...
Every time you click a suspicious link, share your email on a shady site, or use the same password across...
Welcome to the test that separates the cyber-savvy from the cyber-sloppy. You may think you’re safe. You don’t click on...
It started like any other Monday. Overcast skies. Heavy traffic on Jinja Road. At 9:13 AM, the IT manager of...
It arrived at 8:47 AM. Subject line: “URGENT – Unpaid Invoice Attached.” To most people, it looked ordinary. To Susan,...
Kawempe, Kampala. February 2025. A junior IT officer at a logistics company is escorted out by security. He is been...
Setting: A dusty, humming office in Lira District. A procurement officer leans over her computer and clicks “Shift + Delete.”...
we specialize in bridging the gap between knowledge and application.
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd