• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • mmugisa_cyber breach
    summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    Secure Remote Working Security Basics

    May 25, 2020
    hacking

    Australia reports a massive cyber attack by a state actor

    June 19, 2020
    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cyber criminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are…

    Read More
    M. B. Mugisa

    You May Also Like

    How I survived a kidnap during an investigation assignment

    June 16, 2022

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018
    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cybercriminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are always…

    Read More
    M. B. Mugisa

    You May Also Like

    The modern warfare: are you safe?

    February 10, 2020
    mmugisa_ATM-Fraud

    ATM fraud report

    February 1, 2018

    How I survived a kidnap during an investigation assignment

    June 16, 2022
  • mmugisa_ATM-Fraud
    summitSECURITY

    ATM fraud report

    February 1, 2018 / No Comments

    ATM Fraud and how bank clients can protect themselves against fraud The issue On 14th Oct 2015, Centenary Bank’s managing director Fabian Kasi issued a statement in respect to the 25 complaints received by the bank from her customers over inconsistencies in their account balances in the bank. This was after a system upgrade. The bank decided to block all customer ATM PINs and requested the customers that want to withdraw over the ATM platform to first reset their ATM PINs. This exercise is currently at all their 63 branches. The bank also instituted cash withdrawal limits to Ugx. 100,000.…

    Read More
    M. B. Mugisa

    You May Also Like

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021

    External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

    August 13, 2019

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020
  • mmugisa_wannacry
    summitSECURITY

    Wanted Cybercrime case studies

    January 12, 2018 / No Comments

    Threats are rising rapidly. But the number of experts working to proactively fight attacks isn’t. BY MUSTAPHA B. MUGISA. Ring. Ring. You are woken up by early morning call from your IT manager with the dreaded news that the bank was robbed during the night. Worried, you ask: “How many people are dead.” None. Did they break through the basement door? No. Where did they pass? “I am here with the Manager, we are also not sure where they passed?” How much has the bank lost? We are not yet sure, but I am afraid, it could be more than…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018

    Is your cyber hygiene adequate?

    August 28, 2019

    #covid19 cyber threats and attack vectors: how to be secure

    April 18, 2020
  • mmugisa_CSRM
    summitSECURITY

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017 / No Comments

    Institute of Forensics and ICT Security in partnership with Summit Consulting Ltd is organizing the 1st Annual Cyber Security and Risk Management Conference.What has so far changed in the cyber security landscape? We are organizing the 1st Annual Cyber Security and Risk Management (CSRM) conference because a lot has changed in the cyber space. We need a conversation with leaders across board on how to proactively anticipate and manage risk which is attendant to automation. We are dealing in an era of artificial intelligence, bigdata and advanced analytics. So if you are not able to go deep into that area as a…

    Read More
    M. B. Mugisa

    You May Also Like

    10 reasons for a career in cybersecurity and forensics

    July 26, 2019
    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018

    The false sense of security

    May 20, 2019
4567

Search

Most Recent Posts:

  • Stop applauding firefighters, demand Architects in the Boardroom. September 12, 2025
  • Why boards must treat risk as a living organism September 9, 2025
  • Cybersecurity awareness, the open gate behind your tallest firewall September 8, 2025
  • Why data Analytics is the new competitive advantage September 2, 2025
  • When did serving the public become a private affair? September 1, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts