• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • summitSECURITY

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021 / No Comments

    The lie: A virtual private network (VPN) connection is very secure. Why it is a lie: VPN encrypts your traffic. But someone could hack into your VPN username and password and access it, and therefore your traffic and all personally indefinable information. Also, your VPN service provider has access to your internet protocol address, URLs you visit, the amount of time you spend connected online, your browsing patterns, data, etc are visible to your provider. A VPN may protect you against your ISP from seeing your traffic, but not from the VPN owner. That is why many governments now use…

    Read More
    M. B. Mugisa

    You May Also Like

    Project frontline: the common schemes cybercriminals use

    November 21, 2019

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020

    External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

    August 13, 2019
  • #WinningMindspark,  summitSECURITY

    Practical application of the Internet of Things

    November 12, 2020 / No Comments

    A lot has been said and written about the Internet of Things (IoT) and Big Data (BD), but what is the practical application of these new concepts? So many gadgets and equipment we use daily now have sensors and trackers installed. From the smart television to radios, cars, beds, houses, tables, and heck, everything in between. Millions of cameras installed in so many streets and homes generate lots of data and these are increasingly becoming interlinked. Businesses can apply IoT in many ways: Tracking behavior Decision making powered by sensors Enhanced visibility and situational analysis Optimized resources deployment And processes…

    Read More
    M. B. Mugisa

    You May Also Like

    #Mindspark 4: Stay a step ahead in life and business

    January 4, 2020

    Are you working from home or working at home?

    November 10, 2020
    mmugisa_board

    What is the role of the board?

    March 28, 2017
  • mmugisa_security-wars
    summitSECURITY

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020 / No Comments

    Practical cybersecurity springs from the little decisions we make every day. While almost all data breaches are inspired by malicious intent, their successful execution (almost always) involves seemingly harmless and unintentional actions of insiders within organizations. The drivers of cybercrime include some of the following: i). The well-meaning system administrators who fail to promptly apply patches from application vendors or for some reason just run new scripts on the production environment without the first sandbox testing them. ii). Employees who unsuspectingly yield to social engineering ploys specifically spear-phishing resulting in loss of credentials, money, and corporate data to their adversaries…

    Read More
    M. B. Mugisa

    You May Also Like

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019

    Practical application of the Internet of Things

    November 12, 2020
    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018
  • #WinningMindspark,  summitSECURITY

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020 / No Comments

    The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported by our associates and affiliates spread regionally. We are aware of our responsibility to keep client information confidential at all times, something we guard jealously, and this report does not in any way disclose any specific client information. Cybersecurity awareness is the best defensive strategy…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_law-and-you

    Nowhere to hide: Chapter 1: Are you a lawyer? Part 2

    April 4, 2020

    How to build cyber resilience in a world of constant threats

    August 26, 2025

    Here is how to implement projects successfully

    November 16, 2020
  • summitSECURITY

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020 / 1 Comment

    In mid-June 2020, someone called requesting my help recover his personal Gmail address that had been hacked. You could hear his desperate voice on the other end of the call. He explained that since the coronavirus pandemic, board members decided to be sending all official documents and board packs to several preferred emails of each board member. “Can you recover my Gmail password and get it from the hackers. I am afraid they are going to see all the board papers and details, which will be catastrophic,” he said. Any victim of cybercrime needs their service restored as soon as…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019
    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018

    Practical application of the Internet of Things

    November 12, 2020
  • hacking
    summitSECURITY

    Australia reports a massive cyber attack by a state actor

    June 19, 2020 / No Comments

    Canberra, 19th June 2020: A massive cyber-attack is spreading across the world, as it causes chaos in its wake. It has been reported in global online media that “On Friday, a massive wave of cyber-attacks swept across 99 countries, with cyber-security experts claiming it could be the biggest attack of its kind ever recorded.” The Australian media reported the following: “Prime Minister Malcolm Turnbull insisted that even if we are targeted, the government is prepared. We are continuing to monitor the situation closely and stand ready to deal with any cyber-security threat to Australia’s critical infrastructure,” he said through a…

    Read More
    M. B. Mugisa

    You May Also Like

    Case study improving the lives of victims of HIV/AIDS

    July 26, 2018
    mmugisa_Enterprise-Security-solutions

    Free webinar on cybersecurity hygiene to improve your security

    July 9, 2021

    The state of cybersecurity in Uganda

    April 12, 2019
1234

Search

Most Recent Posts:

  • What Makes Modern Online Casinos So Popular January 30, 2026
  • A Culinary Journey: Exploring the World of Delicious Recipes December 26, 2025
  • Appreciation Note to IDRC’s ED, Prof. Moses Kamya December 4, 2025
  • Who I am, and why I am uncomfortable in strategy retreats December 2, 2025
  • Why culture fails long before strategy does November 26, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts