
“It wasn’t me.” That was the first thing Joseph, the internal auditor of a mid-sized Ugandan bank, blurted out when...
“It wasn’t me.” That was the first thing Joseph, the internal auditor of a mid-sized Ugandan bank, blurted out when...
On the morning of June 18th, 2025, a mid-level bank manager in Kampala received a call that left him trembling....
Cyberattacks do not begin with code. They begin with people. One click on a malicious email, one weak password, one...
USBs and betrayal: The small devices behind big data leaks They fit in your pocket. But they can sink an...
It is not the file you send. It is what is hidden inside it. Every time you share a document,...
Everyone loves to preach about “trust.” It is easy. It feels good. It looks good on glossy company brochures and...
“A good con doesn’t need to be clever it just needs a willing victim.” Every few years, a financial institution...
In the good old days, before COVID19, the easiest way to keep children from online dangers was to not give...
we specialize in bridging the gap between knowledge and application.
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd