• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • summitSECURITY

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021 / No Comments

    The lie: A virtual private network (VPN) connection is very secure. Why it is a lie: VPN encrypts your traffic. But someone could hack into your VPN username and password and access it, and therefore your traffic and all personally indefinable information. Also, your VPN service provider has access to your internet protocol address, URLs you visit, the amount of time you spend connected online, your browsing patterns, data, etc are visible to your provider. A VPN may protect you against your ISP from seeing your traffic, but not from the VPN owner. That is why many governments now use…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017

    Secure Remote Working Security Basics

    May 25, 2020

    Cybersecurity basics for law firms

    June 24, 2017
  • #WinningMindspark,  summitSECURITY

    Practical application of the Internet of Things

    November 12, 2020 / No Comments

    A lot has been said and written about the Internet of Things (IoT) and Big Data (BD), but what is the practical application of these new concepts? So many gadgets and equipment we use daily now have sensors and trackers installed. From the smart television to radios, cars, beds, houses, tables, and heck, everything in between. Millions of cameras installed in so many streets and homes generate lots of data and these are increasingly becoming interlinked. Businesses can apply IoT in many ways: Tracking behavior Decision making powered by sensors Enhanced visibility and situational analysis Optimized resources deployment And processes…

    Read More
    M. B. Mugisa

    You May Also Like

    Uganda’s 2025/26 Budget– bigger wallet. Same old shopping list

    June 15, 2025

    Is your board empowering you?

    September 18, 2019

    Ugandan companies continue to struggle in areas of Governance

    April 21, 2020
  • mmugisa_security-wars
    summitSECURITY

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020 / No Comments

    Practical cybersecurity springs from the little decisions we make every day. While almost all data breaches are inspired by malicious intent, their successful execution (almost always) involves seemingly harmless and unintentional actions of insiders within organizations. The drivers of cybercrime include some of the following: i). The well-meaning system administrators who fail to promptly apply patches from application vendors or for some reason just run new scripts on the production environment without the first sandbox testing them. ii). Employees who unsuspectingly yield to social engineering ploys specifically spear-phishing resulting in loss of credentials, money, and corporate data to their adversaries…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_ATM-Fraud

    ATM fraud report

    February 1, 2018

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018

    How I survived a kidnap during an investigation assignment

    June 16, 2022
  • #WinningMindspark,  summitSECURITY

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020 / No Comments

    The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported by our associates and affiliates spread regionally. We are aware of our responsibility to keep client information confidential at all times, something we guard jealously, and this report does not in any way disclose any specific client information. Cybersecurity awareness is the best defensive strategy…

    Read More
    M. B. Mugisa

    You May Also Like

    Tool #40 of 104 is use the watertight principle for your life’s success

    June 17, 2019

    Why do some Ugandan businesses fail?

    March 22, 2018

    Team conflict vs team harmony

    September 23, 2019
  • summitSECURITY

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020 / 1 Comment

    In mid-June 2020, someone called requesting my help recover his personal Gmail address that had been hacked. You could hear his desperate voice on the other end of the call. He explained that since the coronavirus pandemic, board members decided to be sending all official documents and board packs to several preferred emails of each board member. “Can you recover my Gmail password and get it from the hackers. I am afraid they are going to see all the board papers and details, which will be catastrophic,” he said. Any victim of cybercrime needs their service restored as soon as…

    Read More
    M. B. Mugisa

    You May Also Like

    The false sense of security

    May 20, 2019
    mmugisa_wannacry

    WannaCry/WannaCrypt Ransomware Q&A

    May 19, 2017

    Cybersecurity: Safeguarding data

    September 3, 2019
  • hacking
    summitSECURITY

    Australia reports a massive cyber attack by a state actor

    June 19, 2020 / No Comments

    Canberra, 19th June 2020: A massive cyber-attack is spreading across the world, as it causes chaos in its wake. It has been reported in global online media that “On Friday, a massive wave of cyber-attacks swept across 99 countries, with cyber-security experts claiming it could be the biggest attack of its kind ever recorded.” The Australian media reported the following: “Prime Minister Malcolm Turnbull insisted that even if we are targeted, the government is prepared. We are continuing to monitor the situation closely and stand ready to deal with any cyber-security threat to Australia’s critical infrastructure,” he said through a…

    Read More
    M. B. Mugisa

    You May Also Like

    Spyware on the rise – be careful of mobile gadget gifts

    December 8, 2021

    External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

    August 13, 2019

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019
1234

Search

Most Recent Posts:

  • Why culture fails long before strategy does November 26, 2025
  • The AI Use-Case Maturity Map: A Strategic governance tool for modern Boards November 24, 2025
  • Building the future by digitizing the trust Ugandans already live by November 19, 2025
  • How boards communicate a vision that inspires action November 13, 2025
  • The unexploited opportunities; the Twezi way November 11, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts