Imagine walking into a hospital. The walls are clean, the staff is dressed in neat uniforms, and everything looks perfect on the surface, but behind the scenes, one nurse decides to skip washing her hands “just this once.” Maybe she’s tired, or in a hurry, or thinks nothing will happen. What follows is devastating: an infection spreads to patients and colleagues alike. Those who never broke protocol still suffer the consequences of one person’s negligence. This is exactly how cybersecurity works. One weak link, one careless act, can expose the entire organization to risks that no amount of sophisticated technology…
The biggest uninsured risk is your own IT team
It began, as most tragedies do, with trust. In a local insurance company, the head of IT had been there for eight years. Loyal, quiet, and efficient. The kind of man who never raised his voice or suspicion. Yet beneath the hum of the servers he managed, a quiet betrayal brewed. Insurance firms love to talk about coverage, floods, fires, and car crashes, but the greatest uninsured risk sits inside their own offices: their IT teams. When fraud happens, people look outward, to hackers, ransomware, or “Russian IPs.” The truth? Eight out of ten breaches in the insurance industry start…
Security starts with you
As we enter Week 2 of Cybersecurity Awareness Month 2025, one truth remains clear: cybersecurity is everyone’s responsibility. Whether you are a student attending lectures online, a CEO managing strategic decisions, a board member shaping governance, or someone simply scrolling through social media, your online actions matter. Cyber threats are becoming more sophisticated, targeted, and relentless. From ransomware attacks crippling institutions to phishing scams that trick individuals into surrendering sensitive data, the digital threat landscape is evolving faster than ever before. This week, our focus is to equip individuals, leaders, and families with actionable cybersecurity knowledge that can make the…
Ghost workers do not just steal salaries but weaken entire institutions
Every board loves to talk about “digitisation” and “firewalls.” But here’s the truth: the easiest way to hack a ministry, bank, or NGO is not through code, it’s through ghosts on payroll. When HR fraud meets weak IT, cybercrime becomes institutionalized. That’s why I designed the Boardroom Payroll Integrity Tool, a no-excuses dashboard for leaders who want to know if their payroll is a fortress or a fraud pipeline. Ask yourself: a) Can you prove every person on payroll exists? b) Who controls the power to add or remove names? c) Are payroll anomalies linked to IT audit trails—or are…
Death is the greatest democracy
On Saturday, I drove over 250km to Kagadi. Not for a wedding. Not for a political rally. But for the burial of a man who lived 100 years and shook the very ground he walked on. By the look of things, the entire district of Kagadi and Hoima closed shop. Over 5,000 people. Ranked and unranked. Big men and nobodies. They all showed up. Not for a concert. Not for money. But to bury a man. That is how powerful he was in life. And yet, he still bowed. That is the irony. Death doesn’t respect influence. It doesn’t care…
Would your team recognize a phishing attempt today in the organization?
Three years ago, I worked with an organization that prided itself on having “world-class” IT controls. Firewalls, intrusion detection, antivirus subscriptions, the full package. During a strategy execution session, I asked the CEO one simple question: Would your staff recognize a phishing attempt if it landed in their inbox today? He smiled and said, “Of course. We train them every year.” To test the assumption, we ran a controlled phishing simulation. Within 24 hours, 41% of staff had clicked the malicious link. Even worse, several forwarded it internally, magnifying the risk. The breach did not start with servers; it started…

















