• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • mmugisa_cyber breach
    summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    Cybercrime on the surface web

    June 11, 2019

    10 reasons for a career in cyber security and forensics?

    July 24, 2019

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cyber criminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are…

    Read More
    M. B. Mugisa

    You May Also Like

    Cybersecurity basics for law firms

    June 24, 2017
    hacking

    Australia reports a massive cyber attack by a state actor

    June 19, 2020

    External Audit of information and communication technology systems of Supervised Financial Institutions (SFIs)

    August 13, 2019
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cybercriminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are always…

    Read More
    M. B. Mugisa

    You May Also Like

    Secure Remote Working Security Basics

    May 25, 2020
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020

    Project frontline: the common schemes cybercriminals use

    November 21, 2019
  • mmugisa_ATM-Fraud
    summitSECURITY

    ATM fraud report

    February 1, 2018 / No Comments

    ATM Fraud and how bank clients can protect themselves against fraud The issue On 14th Oct 2015, Centenary Bank’s managing director Fabian Kasi issued a statement in respect to the 25 complaints received by the bank from her customers over inconsistencies in their account balances in the bank. This was after a system upgrade. The bank decided to block all customer ATM PINs and requested the customers that want to withdraw over the ATM platform to first reset their ATM PINs. This exercise is currently at all their 63 branches. The bank also instituted cash withdrawal limits to Ugx. 100,000.…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_avoid-cyber-crime

    How to avoid being a cyber-crime victim

    February 5, 2018

    Cybersecurity basics for law firms

    June 24, 2017

    The cybercriminals are collaborating, what about you?

    July 23, 2021
  • mmugisa_wannacry
    summitSECURITY

    Wanted Cybercrime case studies

    January 12, 2018 / No Comments

    Threats are rising rapidly. But the number of experts working to proactively fight attacks isn’t. BY MUSTAPHA B. MUGISA. Ring. Ring. You are woken up by early morning call from your IT manager with the dreaded news that the bank was robbed during the night. Worried, you ask: “How many people are dead.” None. Did they break through the basement door? No. Where did they pass? “I am here with the Manager, we are also not sure where they passed?” How much has the bank lost? We are not yet sure, but I am afraid, it could be more than…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_Enterprise-Security-solutions

    Free webinar on cybersecurity hygiene to improve your security

    July 9, 2021

    Spyware on the rise – be careful of mobile gadget gifts

    December 8, 2021
    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019
  • mmugisa_CSRM
    summitSECURITY

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017 / No Comments

    Institute of Forensics and ICT Security in partnership with Summit Consulting Ltd is organizing the 1st Annual Cyber Security and Risk Management Conference.What has so far changed in the cyber security landscape? We are organizing the 1st Annual Cyber Security and Risk Management (CSRM) conference because a lot has changed in the cyber space. We need a conversation with leaders across board on how to proactively anticipate and manage risk which is attendant to automation. We are dealing in an era of artificial intelligence, bigdata and advanced analytics. So if you are not able to go deep into that area as a…

    Read More
    M. B. Mugisa

    You May Also Like

    Secure Remote Working Security Basics

    May 25, 2020

    Project frontline: the common schemes cybercriminals use

    November 21, 2019

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019
4567

Search

Most Recent Posts:

  • What every board member should know? June 5, 2025
  • The meeting without chairs, a project without a responsible person June 4, 2025
  • Be the elephant in the boardroom, true leadership doesn’t shout. May 23, 2025
  • The hidden power broker in corporate governance May 23, 2025
  • Who evaluates the chair? The Board’s unspoken blind spot May 23, 2025

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2024. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login