Featured Articles

Featured Articles

Your Smartphone: Friend or Foe?

How safe is your information and pictures? Have you ever paused to think what would happen in the event that your phone got hacked? Or lost and the information on it accessed? Those handheld gadgets that take up a big percentage of most peoples’ lives providing access to entertainment, communication, health information, commercial services, among others are more of a threat to you than you can ever

Related

January – February 2022

Cybercrime is a constant business: Three business areas to watch out for! “Malicious attackers take advantage of the health crisis to craft targeted emails in

September-October 2021

Is your remote working secure? R emote-working (teleworking) is a must for several enterprises to survive in business today, following the COVID-19 pandemic crisis. There

November/ December 2019

Intellectual Property Protection One of the principal responsibilities of cybersecurity professionals is protecting the intellectual property belonging to their organizations from unofficial use or disclosure.

October/ November 2019

Featured Articles The Biggest Cybersecurity Targets Organizations have a number of digital assets that cybercriminals want. Mainly, they want money, but usually, they’ll take anything

April/ May 2019

Featured Articles Phishing Scams Of recent, phishing is becoming more common and more sophisticated. A recent Microsoft Security Intelligence Report states that phishing attacks are

April 2019

Featured Articles The Unexpected cyber threats Online communication involves two people or organizations doing business through messages sent over an internet connection. The expectation is

Training Calender 2021

Download and view the training calendar program for the year 2021. Intakes start in January 2021

Frontline Report 2018

In line with our strategy to support the fight against the everincreasing threat of cybercrime, effective 2018, Summit Consulting Ltd has launched the “FRONTLINE” project to streamline the act of security assessments.

Write an effective investigation report

Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues at hand. Everyone wants to

Subscribe to Newletter

Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.