The lie: A virtual private network (VPN) connection is very secure. Why it is a lie: VPN encrypts your traffic. But someone could hack into your VPN username and password and access it, and therefore your traffic and all personally indefinable information. Also, your VPN service provider has access to your internet protocol address, URLs you visit, the amount of time you spend connected online, your browsing patterns, data, etc are visible to your provider. A VPN may protect you against your ISP from seeing your traffic, but not from the VPN owner. That is why many governments now use…
Summit Cybersecurity Project Frontline Report 2020 launch
The best and most effective defense against cybersecurity attacks is user awareness. It is against this background that we publish the annual cybersecurity project frontlines report since 2019. During 2019, we undertook 451 assignments spread over 204 clients. Many of these assignments (40%) are outsourced to us, while others are directly handled, and some reported by our associates and affiliates spread regionally. We are aware of our responsibility to keep client information confidential at all times, something we guard jealously, and this report does not in any way disclose any specific client information. Cybersecurity awareness is the best defensive strategy…
10 reasons for a career in cyber security and forensics?
10th reason: Cyber security and forensics offers skills in high demand for your personal success by all organizations. Which professional do you call when your car has engine problems? You call in a mechanic. Who do you call when you want to manage your personal, family and business finances? You call an accountant, right? Who do you call when your mobile phone or computer gets hacked? You call in a cyber security expert. You need to specialize in a field that gives you lots of career opportunities whereby your skills are demanded by all companies, large or small. Today,…
Cyber security as a service (Csaas)
Blockchain hacked. Once hailed as unhackable, blockchains are now getting hacked. That was the headline of an article by Mike Orcutt that was published on MIT Technology Review online, on February 19th, 2019. Here is an extract from the article: “Early last month [January – Editor], the security team at Coinbase noticed something strange going on in Ethereum Classic, one of the cryptocurrencies people can buy and sell using Coinbase’s popular exchange platform. Its blockchain, the history of all its transactions, was under attack. An attacker had somehow gained control of more than half of the network’s computing power and was…
The state of cybersecurity in Uganda
A discussion with Mustapha B. Mugisa, of mustaphabm3.sg-host.com. 1. How safe are businesses/individuals online? Starting with businesses, their safety is guaranteed if and only if they are engaged and actively assessing and probing their infrastructure and systems for vulnerabilities in small time frames like once every 4 to 6 months due to the dynamic element of discovered vulnerabilities and bugs in systems and software. Most of the leaders may not be paying attention to cyber security at all. When it comes to physical security, leaders are paying attention and you can see that in the presence of security guards, bio-metric…
How much have you invested into your computer security?
Today, every company or organization worth its name has at least more than 70% of its workforce doing office work on computers. Most staff have basic computer skills to enable them perform office tasks. Computer work contains sensitive information ranging from the financial stand of the company, strategy, customer details and the company trade secrets–information all companies guard jealously from their competitors lest they are edged out of business or risk spending a lot in legal costs in court cases. However, after buying the desk top computers, mobile gadgets or lap tops and connecting them to the local area network…