News & Blog
- All Posts
- Blog
- Career Management
- Computer Security
- Cyber Defence
- Cyber Incidence Response
- Cyber Preparedness
- Cyber Security
- Data Privacy
- Endpoint Security
- Fraud Investigation and Examination
- Fraud Management
- IT Security Audit
- Marketing
- Mobile Security
- Training
- UX/UI Design
- Web Development
Although this is a real case drawn from field experience, the names and locations have been altered to...
Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to...
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank...
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told...

Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a...
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the...
In January 2023, we received a phone call from the CEO of a well-known logistics company. His voice...
How Omundo stole money using ATM cards that were not his This case is about a man who...
Pornography is a silent pandemic. It claims one victim at a time. Thanks to the Internet, the problem...

