• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • Fraud,  summitSECURITY

    Cybercrime on the surface web

    June 11, 2019 / No Comments

    There are three levels of internet. The normal web. The deep web. And the dark web. Normal internet users access the surface web. You type any website in the any browser like Google chrome, you will be accessing the website on the surface web. Figure 1: surface web page Websites of all legal companies operate at the surface web. Many of these sites use cache on their sites. This means they will collect some information from you when you visit the sites. The objective is to improve your experience while on their website. Read the full article here  

    Read More
    M. B. Mugisa

    You May Also Like

    Accounting crime and fraud challenges

    December 3, 2018

    The rise and fall of Victoria Basin Savings and Microfinance Cooperative Trust Ltd (VBS)

    June 5, 2019

    The sophisticated “Christian”

    April 1, 2019
  • summitSECURITY

    The false sense of security

    May 20, 2019 / No Comments

    You are not safe as you may think. Even sophisticated IT security professionals, are naked on line but have a false sense of security. A simple test of their password strength against brute force attack will reveal that their passwords are so weak that it would take just under six minutes to break them. During a cyber security awareness training, Mustapha B Mugisa of Summit Consulting Ltd, asked participants to conduct self test of their password strengths. The computer was able to hack them within just less than two seconds. Imagine that many people use passwords that are just under…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_wannacry

    WannaCry/WannaCrypt Ransomware Q&A

    May 19, 2017

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020
  • summitSECURITY

    The state of cybersecurity in Uganda

    April 12, 2019 / No Comments

    A discussion with Mustapha B. Mugisa, of mustaphabm3.sg-host.com. 1. How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of discovered vulnerabilities and bugs in systems and software. Most of the leaders may not be paying attention to cyber security at all. When it comes to physical security, leaders are paying attention and you can see that in the presence of security guards, bio-metric…

    Read More
    M. B. Mugisa

    You May Also Like

    Why a career in cybersecurity? Part 1

    August 14, 2019

    Is your cyber hygiene adequate?

    August 28, 2019

    10 reasons for a career in cyber security and forensics?

    July 24, 2019
  • mmugisa_internet-policed
    summitSECURITY

    How much have you invested into your computer security?

    March 29, 2019 / No Comments

    Today, every company or organization worth its name has at least more than 70% of its workforce doing office work on computers. Most staff have basic computer skills to enable them perform office tasks. Computer work contains sensitive information ranging from the financial stand of the company, strategy, customer details and the company trade secrets–information all companies guard jealously from their competitors lest they are edged out of business or risk spending a lot in legal costs in court cases. However, after buying the desk top computers, mobile gadgets or lap tops and connecting them to the local area network…

    Read More
    M. B. Mugisa

    You May Also Like

    hacking

    Australia reports a massive cyber attack by a state actor

    June 19, 2020

    Cybercrime on the surface web

    June 11, 2019

    The modern warfare: are you safe?

    February 10, 2020
  • summitSECURITY

    Case study improving the lives of victims of HIV/AIDS

    July 26, 2018 / No Comments

    Nothing eats stakeholder value like fraud and corruption. Prevention of fraud is better than investigations. To this end, Summit Consulting Ltd is often called to provide on-going fraud management training to promote awareness of fraud red flags, what you can do as a staff member when you suspect fraud and fraud investigation.  In the following case study, print and share with your team and ask them to answer the questions that follow in groups of three. To implement an effective fraud risk management framework, visit www.summitcl.com/forensics and download a free toolkit to transform your organisation. Promote transparency and become a…

    Read More
    M. B. Mugisa

    You May Also Like

    How I survived a kidnap during an investigation assignment

    June 16, 2022

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020

    10 reasons for a career in cybersecurity and forensics

    July 26, 2019
  • summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021
    mmugisa_CSRM

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017

    The cybercriminals are collaborating, what about you?

    July 23, 2021
34567

Search

Most Recent Posts:

  • Why culture fails long before strategy does November 26, 2025
  • The AI Use-Case Maturity Map: A Strategic governance tool for modern Boards November 24, 2025
  • Building the future by digitizing the trust Ugandans already live by November 19, 2025
  • How boards communicate a vision that inspires action November 13, 2025
  • The unexploited opportunities; the Twezi way November 11, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts