• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • mmugisa_cyber breach
    summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    How I survived a kidnap during an investigation assignment

    June 16, 2022

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cyber criminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are…

    Read More
    M. B. Mugisa

    You May Also Like

    Cybersecurity basics for law firms

    June 24, 2017
    hacking

    Australia reports a massive cyber attack by a state actor

    June 19, 2020

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cybercriminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are always…

    Read More
    M. B. Mugisa

    You May Also Like

    Cybersecurity: Safeguarding data

    September 3, 2019

    Cybersecurity basics for law firms

    June 24, 2017

    Many victims of cybercrime never report to police

    June 16, 2020
  • mmugisa_ATM-Fraud
    summitSECURITY

    ATM fraud report

    February 1, 2018 / No Comments

    ATM Fraud and how bank clients can protect themselves against fraud The issue On 14th Oct 2015, Centenary Bank’s managing director Fabian Kasi issued a statement in respect to the 25 complaints received by the bank from her customers over inconsistencies in their account balances in the bank. This was after a system upgrade. The bank decided to block all customer ATM PINs and requested the customers that want to withdraw over the ATM platform to first reset their ATM PINs. This exercise is currently at all their 63 branches. The bank also instituted cash withdrawal limits to Ugx. 100,000.…

    Read More
    M. B. Mugisa

    You May Also Like

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019
    mmugisa_bank-security

    Bank security insights

    June 2, 2017
    mmugisa_cyber breach

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018
  • mmugisa_wannacry
    summitSECURITY

    Wanted Cybercrime case studies

    January 12, 2018 / No Comments

    Threats are rising rapidly. But the number of experts working to proactively fight attacks isn’t. BY MUSTAPHA B. MUGISA. Ring. Ring. You are woken up by early morning call from your IT manager with the dreaded news that the bank was robbed during the night. Worried, you ask: “How many people are dead.” None. Did they break through the basement door? No. Where did they pass? “I am here with the Manager, we are also not sure where they passed?” How much has the bank lost? We are not yet sure, but I am afraid, it could be more than…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_ATM-Fraud

    ATM fraud report

    February 1, 2018
    hacking

    Australia reports a massive cyber attack by a state actor

    June 19, 2020

    Spyware on the rise – be careful of mobile gadget gifts

    December 8, 2021
  • mmugisa_CSRM
    summitSECURITY

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017 / No Comments

    Institute of Forensics and ICT Security in partnership with Summit Consulting Ltd is organizing the 1st Annual Cyber Security and Risk Management Conference.What has so far changed in the cyber security landscape? We are organizing the 1st Annual Cyber Security and Risk Management (CSRM) conference because a lot has changed in the cyber space. We need a conversation with leaders across board on how to proactively anticipate and manage risk which is attendant to automation. We are dealing in an era of artificial intelligence, bigdata and advanced analytics. So if you are not able to go deep into that area as a…

    Read More
    M. B. Mugisa

    You May Also Like

    Many victims of cybercrime never report to police

    June 16, 2020
    mmugisa_ATM-Fraud

    ATM fraud report

    February 1, 2018
    mmugisa_Enterprise-Security-solutions

    Free webinar on cybersecurity hygiene to improve your security

    July 9, 2021
4567

Search

Most Recent Posts:

  • How you strengthen your risk governance March 13, 2026
  • Why smart teams still make dumb decisions in organisations March 3, 2026
  • NGO fraud red flags and why cybersecurity and fraud risk assessment are now urgent in a resource-constrained context February 25, 2026
  • Board structure for effective committee intersection and oversight tool February 23, 2026
  • Directors come unprepared yet speak the most February 18, 2026

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2026. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts