• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Articles & News
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • What is your Financial IQ?
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • About Mr Strategy
  • Support
    • Love Life
    • Gallery
    • Contact
    • Clients
    • Shop
    • Free Downloads
    • Book Mustapha
Search
Close
  • mmugisa_cyber breach
    summitSECURITY

    How to avoid being a cyber-crime victim, part 2

    February 6, 2018 / No Comments

    One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cyber criminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are…

    Read More
    M. B. Mugisa

    You May Also Like

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021
    mmugisa_wannacry

    Wanted Cybercrime case studies

    January 12, 2018

    Many victims of cybercrime never report to police

    June 16, 2020
  • mmugisa_avoid-cyber-crime
    summitSECURITY

    How to avoid being a cyber-crime victim

    February 5, 2018 / No Comments

    Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cybercriminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are always…

    Read More
    M. B. Mugisa

    You May Also Like

    Is your cyber hygiene adequate?

    August 28, 2019

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020
  • mmugisa_ATM-Fraud
    summitSECURITY

    ATM fraud report

    February 1, 2018 / No Comments

    ATM Fraud and how bank clients can protect themselves against fraud The issue On 14th Oct 2015, Centenary Bank’s managing director Fabian Kasi issued a statement in respect to the 25 complaints received by the bank from her customers over inconsistencies in their account balances in the bank. This was after a system upgrade. The bank decided to block all customer ATM PINs and requested the customers that want to withdraw over the ATM platform to first reset their ATM PINs. This exercise is currently at all their 63 branches. The bank also instituted cash withdrawal limits to Ugx. 100,000.…

    Read More
    M. B. Mugisa

    You May Also Like

    Uninvited guests in the dead of the night

    May 12, 2022

    Many victims of cybercrime never report to police

    June 16, 2020
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020
  • mmugisa_wannacry
    summitSECURITY

    Wanted Cybercrime case studies

    January 12, 2018 / No Comments

    Threats are rising rapidly. But the number of experts working to proactively fight attacks isn’t. BY MUSTAPHA B. MUGISA. Ring. Ring. You are woken up by early morning call from your IT manager with the dreaded news that the bank was robbed during the night. Worried, you ask: “How many people are dead.” None. Did they break through the basement door? No. Where did they pass? “I am here with the Manager, we are also not sure where they passed?” How much has the bank lost? We are not yet sure, but I am afraid, it could be more than…

    Read More
    M. B. Mugisa

    You May Also Like

    How I survived a kidnap during an investigation assignment

    June 16, 2022

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021

    10 reasons for a career in cyber security and forensics?

    July 24, 2019
  • mmugisa_CSRM
    summitSECURITY

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017 / No Comments

    Institute of Forensics and ICT Security in partnership with Summit Consulting Ltd is organizing the 1st Annual Cyber Security and Risk Management Conference.What has so far changed in the cyber security landscape? We are organizing the 1st Annual Cyber Security and Risk Management (CSRM) conference because a lot has changed in the cyber space. We need a conversation with leaders across board on how to proactively anticipate and manage risk which is attendant to automation. We are dealing in an era of artificial intelligence, bigdata and advanced analytics. So if you are not able to go deep into that area as a…

    Read More
    M. B. Mugisa

    You May Also Like

    The false sense of security

    May 20, 2019

    10 reasons for a career in cybersecurity and forensics

    July 26, 2019

    ICPAU webinar on cybersecurity and IT risks: are you secure online?

    July 30, 2020
4567

Search

Most Recent Posts:

  • When the old men speak, the village listens; lessons from Hoima, part II April 15, 2026
  • When to say No: The discipline behind great strategy April 14, 2026
  • The cost of small comforts in an organisation April 7, 2026
  • Why the future belongs to those who redefine the game April 2, 2026
  • Authority without legitimacy is control without loyalty. March 30, 2026

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Ignite your curiosity, unleash your creativity, and embark on a transformative journey of endless possibilities.

Transform

Way of the Guerilla
Speak to Influence
Effective board Member

Resources

Books
Hot tips
Trainings
Free downloads

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

©2026. Mustapha B. Mugisa Mr. Strategy. All Rights Reserved

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login

  • About
  • Gallery
    • Gallery 01
    • Gallery 02
    • Gallery 03
  • Contacts