cyber attacks

I.T Security Controls

I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in place to address security risks. A security control can also be defined as an action, a mechanism that we apply to our I.T. infrastructure to either to protect our systems …

I.T Security Controls Read More »

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information, …

Healthcare Cybersecurity: Are your medical records safe? Read More »

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE

The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses Shs 122bn annually to cyber-attacks and it is further stated that the increase in the cost of cybercrime in the country is due to the increased sophistication of local cyber …

INVITATION TO ATTEND THE 3RD ANNUAL CYBERSECURITY AND RISK MANAGEMENT CONFERENCE Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.