Latest articles & Insights

Here, i go beyond the headlines to uncover practical solutions, expert analysis, and proven frameworks to help you win in the age of disruption. Whether you’re a CEO, entrepreneur, or a curious professional, my articles and insights are designed to challenge your thinking, sharpen your strategy, and inspire bold action.

Cyber security facts and fiction: part 3

virus

Issue: A new ransom-ware, Locky, is up and about, crawling the Internet for the next prey. It is brilliant. It’s persistent. And it won’t go without taking some of your money.

Locky virus encrypts your computer files (rendering them unreadable). It then demands a ransom from you [the victim] to your files back. OR to get the decryption key.

Fact: The attack vector is simple and the usual approach: If you are a target, you will receive an email with a subject line that goes like: “ATTN: Invoice J-98223146”. A word document is attached. Sometimes the file is a .zip file, which has a word or excel document. You may be wondering how would hackers get your email address? Whenever you download a software or register on-line on sites that are not legit, you leave your email. It may be harvested and used for such purposes. It is critical you become careful where you leave your email. Once you click on the email in the attachment, a new document will open which looks unclear. The document will ask you to “enable Macros.” If you click enable, that will be your end. As you enable the macros, in the background, Locky will install in your computer and all your documents will be encrypted. After which, a message will appear asking for a ransom so as to get your files back. That could be a cool US$500 plus!!!

Fiction: No one is 100% secure. Locky is very genius. You may delete the email on the first attempt. However, on the second attempt, you may end up accidentally installing it.

Fix: Train all your staff. Keep your anti-virus definitions up to date. Do not use predictable email nomenclature. Ask your staff to avoid using company emails to register on any website online. Do not give average users Admin accounts. And do not connect critical servers to the Internet

Read the latest articles

Who I am, and why I am uncomfortable in strategy retreats

Who I am, and why I am uncomfortable in strategy retreats

I learned long ago that strategy retreats are the corporate equivalent of…

Why culture fails long before strategy does

Why culture fails long before strategy does

I have spent enough time in boardrooms, ministries, parastatals, universities, banks, and…

The AI Use-Case Maturity Map: A Strategic governance tool for modern Boards

The AI Use-Case Maturity Map: A Strategic governance tool for modern Boards

Artificial intelligence is no longer a distant concept but actively redefining business…

About Mustapha Mugisa

Mustapha B. Mugisa is one of those rare individuals who delivers unparalleled value-based consulting to professionals and corporate entities that demand excellence. As an alumnus of EY and the current President of the Association of Certified Fraud Examiners (ACFE) Uganda Chapter, Mustapha brings a wealth of experience and expertise to every engagement.

Transform your condition

What do you want me to transform today?

Personal Success

I want a clear personal strategy, action plan and be the best version of myself

Speak to Influence

I want to speak to influence, not to just inform. I want to stand out of the crowd. To lead.

Business Growth

I want to master governance secrets for business growth and maximize profits