
Money left a corporate account without malware, without a breached firewall. It moved because the system accepted it. The phone...

Money left a corporate account without malware, without a breached firewall. It moved because the system accepted it. The phone...

On a Thursday afternoon, the liquidity report was clean. By Monday morning, UGX 4.7 billion had moved out of the...

A cybersecurity case leaders rarely want to hear The breach did not come through the firewall. It came through a...

It happened quietly, and that is how most frauds begin in Uganda; not with alarms, but with silence. On a...

As the year draws to a close, we pause with gratitude. Thank you for the trust you placed in us,...

I receive many cases, and some stand out. During a school holiday two years ago, a parent complained that their...

Some moments are unforgettable. I was sitting in a boardroom late in the evening, and the investigation was done. Everyone...

Are you a victim of fraud? Are you working too hard and cannot see where the money goes? Are you...

We live in a digital world where basically the use of computers, the Internet, and other sophisticated technology is at...

Let me begin with a simple truth that many parents in Uganda still underestimate. Your child is already living in...
we specialize in bridging the gap between knowledge and application.

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd