• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • Fraud,  summitSECURITY

    Cybercrime on the surface web

    June 11, 2019 / No Comments

    There are three levels of internet. The normal web. The deep web. And the dark web. Normal internet users access the surface web. You type any website in the any browser like Google chrome, you will be accessing the website on the surface web. Figure 1: surface web page Websites of all legal companies operate at the surface web. Many of these sites use cache on their sites. This means they will collect some information from you when you visit the sites. The objective is to improve your experience while on their website. Read the full article here  

    Read More
    M. B. Mugisa

    You May Also Like

    Improving the lives of victims of HIV/Aids

    April 4, 2019

    The rise and fall of Victoria Basin Savings and Microfinance Cooperative Trust Ltd (VBS)

    June 5, 2019

    Here is how to transform your internal audit department

    June 2, 2020
  • summitSECURITY

    The false sense of security

    May 20, 2019 / No Comments

    You are not safe as you may think. Even sophisticated IT security professionals, are naked on line but have a false sense of security. A simple test of their password strength against brute force attack will reveal that their passwords are so weak that it would take just under six minutes to break them. During a cyber security awareness training, Mustapha B Mugisa of Summit Consulting Ltd, asked participants to conduct self test of their password strengths. The computer was able to hack them within just less than two seconds. Imagine that many people use passwords that are just under…

    Read More
    M. B. Mugisa

    You May Also Like

    Case study improving the lives of victims of HIV/AIDS

    July 26, 2018
    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017

    Many victims of cybercrime never report to police

    June 16, 2020
  • summitSECURITY

    The state of cybersecurity in Uganda

    April 12, 2019 / No Comments

    A discussion with Mustapha B. Mugisa, of mustaphabm3.sg-host.com. 1. How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of discovered vulnerabilities and bugs in systems and software. Most of the leaders may not be paying attention to cyber security at all. When it comes to physical security, leaders are paying attention and you can see that in the presence of security guards, bio-metric…

    Read More
    M. B. Mugisa

    You May Also Like

    Project frontline: the common schemes cybercriminals use

    November 21, 2019

    Why a career in cybersecurity? Part 1

    August 14, 2019

    External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

    August 13, 2019
  • mmugisa_internet-policed
    summitSECURITY

    How much have you invested into your computer security?

    March 29, 2019 / No Comments

    Today, every company or organization worth its name has at least more than 70% of its workforce doing office work on computers. Most staff have basic computer skills to enable them perform office tasks. Computer work contains sensitive information ranging from the financial stand of the company, strategy, customer details and the company trade secrets–information all companies guard jealously from their competitors lest they are edged out of business or risk spending a lot in legal costs in court cases. However, after buying the desk top computers, mobile gadgets or lap tops and connecting them to the local area network…

    Read More
    M. B. Mugisa

    You May Also Like

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020
    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017

    Is your cyber hygiene adequate?

    August 28, 2019
  • summitSECURITY

    Case study improving the lives of victims of HIV/AIDS

    July 26, 2018 / No Comments

    Nothing eats stakeholder value like fraud and corruption. Prevention of fraud is better than investigations. To this end, Summit Consulting Ltd is often called to provide on-going fraud management training to promote awareness of fraud red flags, what you can do as a staff member when you suspect fraud and fraud investigation.  In the following case study, print and share with your team and ask them to answer the questions that follow in groups of three. To implement an effective fraud risk management framework, visit www.summitcl.com/forensics and download a free toolkit to transform your organisation. Promote transparency and become a…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_Enterprise-Security-solutions

    Free webinar on cybersecurity hygiene to improve your security

    July 9, 2021

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020

    Why a career in cybersecurity? Part 1

    August 14, 2019
  • summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    The cybercriminals are collaborating, what about you?

    July 23, 2021

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020

    Case study improving the lives of victims of HIV/AIDS

    July 26, 2018
34567

Search

Most Recent Posts:

  • Stop applauding firefighters, demand Architects in the Boardroom. September 12, 2025
  • Why boards must treat risk as a living organism September 9, 2025
  • Cybersecurity awareness, the open gate behind your tallest firewall September 8, 2025
  • Why data Analytics is the new competitive advantage September 2, 2025
  • When did serving the public become a private affair? September 1, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts