• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • mmugisa_cyber breach
    summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    Spyware on the rise – be careful of mobile gadget gifts

    December 8, 2021

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021
    mmugisa_ATM-Fraud

    ATM fraud report

    February 1, 2018
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cyber criminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_wannacry

    WannaCry/WannaCrypt Ransomware Q&A

    May 19, 2017
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020
    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cybercriminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are always…

    Read More
    M. B. Mugisa

    You May Also Like

    External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

    August 13, 2019

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020
  • mmugisa_ATM-Fraud
    summitSECURITY

    ATM fraud report

    February 1, 2018 / No Comments

    ATM Fraud and how bank clients can protect themselves against fraud The issue On 14th Oct 2015, Centenary Bank’s managing director Fabian Kasi issued a statement in respect to the 25 complaints received by the bank from her customers over inconsistencies in their account balances in the bank. This was after a system upgrade. The bank decided to block all customer ATM PINs and requested the customers that want to withdraw over the ATM platform to first reset their ATM PINs. This exercise is currently at all their 63 branches. The bank also instituted cash withdrawal limits to Ugx. 100,000.…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019

    How I survived a kidnap during an investigation assignment

    June 16, 2022

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020
  • mmugisa_wannacry
    summitSECURITY

    Wanted Cybercrime case studies

    January 12, 2018 / No Comments

    Threats are rising rapidly. But the number of experts working to proactively fight attacks isn’t. BY MUSTAPHA B. MUGISA. Ring. Ring. You are woken up by early morning call from your IT manager with the dreaded news that the bank was robbed during the night. Worried, you ask: “How many people are dead.” None. Did they break through the basement door? No. Where did they pass? “I am here with the Manager, we are also not sure where they passed?” How much has the bank lost? We are not yet sure, but I am afraid, it could be more than…

    Read More
    M. B. Mugisa

    You May Also Like

    10 reasons for a career in cyber security and forensics?

    July 24, 2019
    mmugisa_CSRM

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017

    Uninvited guests in the dead of the night

    May 12, 2022
  • mmugisa_CSRM
    summitSECURITY

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017 / No Comments

    Institute of Forensics and ICT Security in partnership with Summit Consulting Ltd is organizing the 1st Annual Cyber Security and Risk Management Conference.What has so far changed in the cyber security landscape? We are organizing the 1st Annual Cyber Security and Risk Management (CSRM) conference because a lot has changed in the cyber space. We need a conversation with leaders across board on how to proactively anticipate and manage risk which is attendant to automation. We are dealing in an era of artificial intelligence, bigdata and advanced analytics. So if you are not able to go deep into that area as a…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019

    The cybercriminals are collaborating, what about you?

    July 23, 2021

    Secure Remote Working Security Basics

    May 25, 2020
4567

Search

Most Recent Posts:

  • What Makes Modern Online Casinos So Popular January 30, 2026
  • A Culinary Journey: Exploring the World of Delicious Recipes December 26, 2025
  • Appreciation Note to IDRC’s ED, Prof. Moses Kamya December 4, 2025
  • Who I am, and why I am uncomfortable in strategy retreats December 2, 2025
  • Why culture fails long before strategy does November 26, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts