There are three levels of internet. The normal web. The deep web. And the dark web. Normal internet users access the surface web. You type any website in the any browser like Google chrome, you will be accessing the website on the surface web. Figure 1: surface web page Websites of all legal companies operate at the surface web. Many of these sites use cache on their sites. This means they will collect some information from you when you visit the sites. The objective is to improve your experience while on their website. Read the full article here
The false sense of security
You are not safe as you may think. Even sophisticated IT security professionals, are naked on line but have a false sense of security. A simple test of their password strength against brute force attack will reveal that their passwords are so weak that it would take just under six minutes to break them. During a cyber security awareness training, Mustapha B Mugisa of Summit Consulting Ltd, asked participants to conduct self test of their password strengths. The computer was able to hack them within just less than two seconds. Imagine that many people use passwords that are just under…
The state of cybersecurity in Uganda
A discussion with Mustapha B. Mugisa, of mustaphabm3.sg-host.com. 1. How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of discovered vulnerabilities and bugs in systems and software. Most of the leaders may not be paying attention to cyber security at all. When it comes to physical security, leaders are paying attention and you can see that in the presence of security guards, bio-metric…
How much have you invested into your computer security?
Today, every company or organization worth its name has at least more than 70% of its workforce doing office work on computers. Most staff have basic computer skills to enable them perform office tasks. Computer work contains sensitive information ranging from the financial stand of the company, strategy, customer details and the company trade secrets–information all companies guard jealously from their competitors lest they are edged out of business or risk spending a lot in legal costs in court cases. However, after buying the desk top computers, mobile gadgets or lap tops and connecting them to the local area network…
Case study improving the lives of victims of HIV/AIDS
Nothing eats stakeholder value like fraud and corruption. Prevention of fraud is better than investigations. To this end, Summit Consulting Ltd is often called to provide on-going fraud management training to promote awareness of fraud red flags, what you can do as a staff member when you suspect fraud and fraud investigation. In the following case study, print and share with your team and ask them to answer the questions that follow in groups of three. To implement an effective fraud risk management framework, visit www.summitcl.com/forensics and download a free toolkit to transform your organisation. Promote transparency and become a…
How to avoid being a cyber-crime victim, part 2
One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…