• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • summitSECURITY

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021 / No Comments

    The lie: A virtual private network (VPN) connection is very secure. Why it is a lie: VPN encrypts your traffic. But someone could hack into your VPN username and password and access it, and therefore your traffic and all personally indefinable information. Also, your VPN service provider has access to your internet protocol address, URLs you visit, the amount of time you spend connected online, your browsing patterns, data, etc are visible to your provider. A VPN may protect you against your ISP from seeing your traffic, but not from the VPN owner. That is why many governments now use…

    Read More
    M. B. Mugisa

    You May Also Like

    How I survived a kidnap during an investigation assignment

    June 16, 2022

    Secure Remote Working Security Basics

    May 25, 2020

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018
  • #WinningMindspark,  summitSECURITY

    Practical application of the Internet of Things

    November 12, 2020 / No Comments

    A lot has been said and written about the Internet of Things (IoT) and Big Data (BD), but what is the practical application of these new concepts? So many gadgets and equipment we use daily now have sensors and trackers installed. From the smart television to radios, cars, beds, houses, tables, and heck, everything in between. Millions of cameras installed in so many streets and homes generate lots of data and these are increasingly becoming interlinked. Businesses can apply IoT in many ways: Tracking behavior Decision making powered by sensors Enhanced visibility and situational analysis Optimized resources deployment And processes…

    Read More
    M. B. Mugisa

    You May Also Like

    Mastering data analytics in 3 hours, from basics to advanced

    July 7, 2025

    Nothing happens to you, it happens because of you, part 2, first D

    July 19, 2021
    crossing-the-ethical

    Are you ethical? Here is how to find out…

    January 5, 2021
  • mmugisa_security-wars
    summitSECURITY

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020 / No Comments

    Practical cybersecurity springs from the little decisions we make every day. While almost all data breaches are inspired by malicious intent, their successful execution (almost always) involves seemingly harmless and unintentional actions of insiders within organizations. The drivers of cybercrime include some of the following: i). The well-meaning system administrators who fail to promptly apply patches from application vendors or for some reason just run new scripts on the production environment without the first sandbox testing them. ii). Employees who unsuspectingly yield to social engineering ploys specifically spear-phishing resulting in loss of credentials, money, and corporate data to their adversaries…

    Read More
    M. B. Mugisa

    You May Also Like

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021

    Practical application of the Internet of Things

    November 12, 2020

    Cybersecurity: Safeguarding data

    September 3, 2019
  • #WinningMindspark,  summitSECURITY

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020 / No Comments

    The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported by our associates and affiliates spread regionally. We are aware of our responsibility to keep client information confidential at all times, something we guard jealously, and this report does not in any way disclose any specific client information. Cybersecurity awareness is the best defensive strategy…

    Read More
    M. B. Mugisa

    You May Also Like

    What every board member should know?

    June 5, 2025
    mmugisa_What is your plan

    What is your plan?

    January 28, 2017

    Work hard to be the best: Qualities of winning children Part 2

    April 3, 2020
  • summitSECURITY

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020 / 1 Comment

    In mid-June 2020, someone called requesting my help recover his personal Gmail address that had been hacked. You could hear his desperate voice on the other end of the call. He explained that since the coronavirus pandemic, board members decided to be sending all official documents and board packs to several preferred emails of each board member. “Can you recover my Gmail password and get it from the hackers. I am afraid they are going to see all the board papers and details, which will be catastrophic,” he said. Any victim of cybercrime needs their service restored as soon as…

    Read More
    M. B. Mugisa

    You May Also Like

    Practical application of the Internet of Things

    November 12, 2020
    mmugisa_cyber breach

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018

    Cybersecurity: Safeguarding data

    September 3, 2019
  • hacking
    summitSECURITY

    Australia reports a massive cyber attack by a state actor

    June 19, 2020 / No Comments

    Canberra, 19th June 2020: A massive cyber-attack is spreading across the world, as it causes chaos in its wake. It has been reported in global online media that “On Friday, a massive wave of cyber-attacks swept across 99 countries, with cyber-security experts claiming it could be the biggest attack of its kind ever recorded.” The Australian media reported the following: “Prime Minister Malcolm Turnbull insisted that even if we are targeted, the government is prepared. We are continuing to monitor the situation closely and stand ready to deal with any cyber-security threat to Australia’s critical infrastructure,” he said through a…

    Read More
    M. B. Mugisa

    You May Also Like

    10 reasons for a career in cyber security and forensics?

    July 24, 2019
    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019
    mmugisa_Enterprise-Security-solutions

    Free webinar on cybersecurity hygiene to improve your security

    July 9, 2021
1234

Search

Most Recent Posts:

  • When the old men speak, the village listens; lessons from Hoima, part II April 15, 2026
  • When to say No: The discipline behind great strategy April 14, 2026
  • The cost of small comforts in an organisation April 7, 2026
  • Why the future belongs to those who redefine the game April 2, 2026
  • Authority without legitimacy is control without loyalty. March 30, 2026

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2026. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts