• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • Fraud,  summitSECURITY

    Cybercrime on the surface web

    June 11, 2019 / No Comments

    There are three levels of internet. The normal web. The deep web. And the dark web. Normal internet users access the surface web. You type any website in the any browser like Google chrome, you will be accessing the website on the surface web. Figure 1: surface web page Websites of all legal companies operate at the surface web. Many of these sites use cache on their sites. This means they will collect some information from you when you visit the sites. The objective is to improve your experience while on their website. Read the full article here  

    Read More
    M. B. Mugisa

    You May Also Like

    Twitter hacked, as Bitcoin double scheme targets A-listers

    July 16, 2020

    Improving the lives of victims of HIV/Aids

    April 4, 2019

    Fighting corruption and fraud risk

    April 2, 2019
  • summitSECURITY

    The false sense of security

    May 20, 2019 / No Comments

    You are not safe as you may think. Even sophisticated IT security professionals, are naked on line but have a false sense of security. A simple test of their password strength against brute force attack will reveal that their passwords are so weak that it would take just under six minutes to break them. During a cyber security awareness training, Mustapha B Mugisa of Summit Consulting Ltd, asked participants to conduct self test of their password strengths. The computer was able to hack them within just less than two seconds. Imagine that many people use passwords that are just under…

    Read More
    M. B. Mugisa

    You May Also Like

    #covid19 cyber threats and attack vectors: how to be secure

    April 18, 2020
    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018

    Secure Remote Working Security Basics

    May 25, 2020
  • summitSECURITY

    The state of cybersecurity in Uganda

    April 12, 2019 / No Comments

    A discussion with Mustapha B. Mugisa, of mustaphabm3.sg-host.com. 1. How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of discovered vulnerabilities and bugs in systems and software. Most of the leaders may not be paying attention to cyber security at all. When it comes to physical security, leaders are paying attention and you can see that in the presence of security guards, bio-metric…

    Read More
    M. B. Mugisa

    You May Also Like

    Cybercrime on the surface web

    June 11, 2019

    Cybersecurity basics for law firms

    June 24, 2017
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020
  • mmugisa_internet-policed
    summitSECURITY

    How much have you invested into your computer security?

    March 29, 2019 / No Comments

    Today, every company or organization worth its name has at least more than 70% of its workforce doing office work on computers. Most staff have basic computer skills to enable them perform office tasks. Computer work contains sensitive information ranging from the financial stand of the company, strategy, customer details and the company trade secrets–information all companies guard jealously from their competitors lest they are edged out of business or risk spending a lot in legal costs in court cases. However, after buying the desk top computers, mobile gadgets or lap tops and connecting them to the local area network…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020

    The cybercriminals are collaborating, what about you?

    July 23, 2021
    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018
  • summitSECURITY

    Case study improving the lives of victims of HIV/AIDS

    July 26, 2018 / No Comments

    Nothing eats stakeholder value like fraud and corruption. Prevention of fraud is better than investigations. To this end, Summit Consulting Ltd is often called to provide on-going fraud management training to promote awareness of fraud red flags, what you can do as a staff member when you suspect fraud and fraud investigation.  In the following case study, print and share with your team and ask them to answer the questions that follow in groups of three. To implement an effective fraud risk management framework, visit www.summitcl.com/forensics and download a free toolkit to transform your organisation. Promote transparency and become a…

    Read More
    M. B. Mugisa

    You May Also Like

    The modern warfare: are you safe?

    February 10, 2020

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020
    mmugisa_wannacry

    WannaCry/WannaCrypt Ransomware Q&A

    May 19, 2017
  • summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019

    Project frontline: the common schemes cybercriminals use

    November 21, 2019

    Uninvited guests in the dead of the night

    May 12, 2022
34567

Search

Most Recent Posts:

  • What every board member should know? June 5, 2025
  • The meeting without chairs, a project without a responsible person June 4, 2025
  • Be the elephant in the boardroom, true leadership doesn’t shout. May 23, 2025
  • The hidden power broker in corporate governance May 23, 2025
  • Who evaluates the chair? The Board’s unspoken blind spot May 23, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login