• Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • Support
    • Love Life
    • Gallery
    • Contact
    • About
    • Clients
    • Shop
      • Free Downloads
    • Book Mustapha
Menu
  • Mr Strategy
  • Mentorship
  • Transform
  • Posts
    • Fr. Paulino
    • Fr John Peter
  • Quizes & Surveys
    • Quizes
      • Test your knowledge with our covid19 quiz
      • Strategy awareness quiz
      • How Hot is Your Relationship?
      • What is your Financial IQ?
      • Risk Management Quiz
      • Risk Management Test
    • Surveys
      • How great is your risk maturity?
    • Evaluations
      • Strategy Retreat Evaluation
      • Strategy Retreat Facilitation
      • End of Training Evaluations
      • Submit a Testimonial
  • Support
    • Love Life
    • Gallery
    • Contact
    • About
    • Clients
    • Shop
      • Free Downloads
    • Book Mustapha
Search
Close
  • summitSECURITY

    Uninvited guests in the dead of the night

    May 12, 2022 / No Comments

    May 10th 2022 has become a key date in our family life. For the wrong reasons. At about 1:30 am, thugs cut through our perimeter wall fence. They were captured on the front security cameras wearing white clothes like those worn by doctors when taking care of Coronavirus patients before they proceeded to climb up and adjusted the security cameras. Some cameras are hidden in different locations including at the neighbours. They did not see them which helped us to see the entire break-in in action. The thugs can be seen walking around the compound, taking stock of everything around.…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020
    mmugisa_bank-security

    Bank security insights

    June 2, 2017
  • summitSECURITY

    Spyware on the rise – be careful of mobile gadget gifts

    December 8, 2021 / No Comments

    We like to gift or be gifted. Sometimes, such devices have installed spyware that monitors all your activities on the phone. Marriages have broken up as a result of one of the partners spying on the other. We have had many cases of marriage partners complaining about spying on them. One of the most outstanding cases is a woman who met a fiancée online via a Facebook networking app. The man happened to be from Uganda but had travelled to Canada for work and studies. After some good years of online dating while abroad, he returned to Uganda for an…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_CSRM

    1st Annual Cyber Security and Risk Management Conference

    October 2, 2017
    mmugisa_security-wars

    The drivers of cybercrime, excerpts from project frontline

    October 30, 2020

    How to avoid being a cyber-crime victim, part 2

    February 8, 2018
  • summitSECURITY

    The cybercriminals are collaborating, what about you?

    July 23, 2021 / No Comments

    If you are a cybersecurity researcher, you have probably heard of increasing cybercrime collaborations and partnerships to fast-track skills development, increase reach and capabilities to target deep pocket prospects and advanced governments. The power is in partnerships. Different ransomware developers have partnered up to share hacking techniques, malware codes, tech infrastructure and target lists. Different hackers are trying to specialise at each phase of the hacking process. Others are focusing on footprinting and reconnaissance. They then pass on the information to another cartel to scan, and another to gain access etc which deepens their capabilities and fast tracks success.  The…

    Read More
    M. B. Mugisa

    You May Also Like

    Summit Cybersecurity Project Frontline Report 2020 launch

    October 26, 2020

    #covid19 cyber threats and attack vectors: how to be secure

    April 18, 2020

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019
  • mmugisa_Enterprise-Security-solutions
    summitSECURITY

    Free webinar on cybersecurity hygiene to improve your security

    July 9, 2021 / No Comments

    “Our systems are very secure. We cannot be hacked. We lose 0% of our annual revenue to fraud and cybersecurity annually.” These are some of the common assurances many leaders get. However, without ongoing cybersecurity awareness efforts, and independent cybersecurity tests (both black box and white box penetration testing), such assurances may be misleading and could land the organization into disaster. If you are not yet hacked, it is because no one is interested in hacking you yet. But that does not mean that you are secure.  As part of our corporate social investment, Summit Consulting in partnership with the…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_wannacry

    WannaCry/WannaCrypt Ransomware Q&A

    May 19, 2017

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021

    Secure Remote Working Security Basics

    May 25, 2020
  • summitSECURITY

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021 / No Comments

    The increasing uptake of virtual working and service delivery has created opportunities and challenges for all. For the cybercriminals, more doors and attack vectors have been opened. At Summit Consulting Ltd and the Institute of Forensics & ICT Security, we shall be highlighting some of the common cybercrime cases to watch out for. Due to client confidentiality, we shall use pseudo names and make references to international cases, where possible. In the following cybercrime series, we shall highlight actual cases with real victims. In this first case, we highlight how cybercriminals steal intellectual property and monetize it. According to the…

    Read More
    M. B. Mugisa

    You May Also Like

    mmugisa_internet-policed

    How much have you invested into your computer security?

    March 29, 2019

    Why a career in cybersecurity? Part 1

    August 14, 2019

    Part 3: 10 reasons for a career in cybersecurity

    July 28, 2019
  • summitSECURITY

    Unmasking the daily lies: VPN has security holes, be aware

    January 29, 2021 / No Comments

    The lie: A virtual private network (VPN) connection is very secure. Why it is a lie: VPN encrypts your traffic. But someone could hack into your VPN username and password and access it, and therefore your traffic and all personally indefinable information. Also, your VPN service provider has access to your internet protocol address, URLs you visit, the amount of time you spend connected online, your browsing patterns, data, etc are visible to your provider. A VPN may protect you against your ISP from seeing your traffic, but not from the VPN owner. That is why many governments now use…

    Read More
    M. B. Mugisa

    You May Also Like

    Cybersecurity basics for law firms

    June 24, 2017
    mmugisa_Enterprise-Security-solutions

    Enterprise security solutions

    July 12, 2017

    Case Name 01/2021: Intellectual Property Crimes

    June 25, 2021
123

Search

Most Recent Posts:

  • Uninvited guests in the dead of the night May 12, 2022
  • Learn to be patient on the road and drive safe April 27, 2022
  • A week with aviators and airline leaders April 12, 2022
  • Strategy and culture need decision rights and empowerment April 1, 2022
  • Go slow on motivational speakers, here is how to invest Ugx. 100k March 25, 2022

Mustapha on #WinningMindset daily insights EP15

Blog Categories

Archives

Search


#WinningMindspark

Win your way through corporate business with these tools

BOARDTOOLS

How present quality board packs that are easy to read and analyze

MENTORSHIP

How many people have you impacted in your life to the level you are?

Linkedin Facebook Twitter

Transform your condition. What do you want to transform today?

Transform

  • Mentor
  • The #WayoftheGuerilla
  • Speak to Influence
  • Effective Boardmember

Resources

  • Books
  • Hot Tips
  • Trainings
  • Free Downloads

© 2021 Mustapha B. Mugisa Mr. Strategy. All Rights Reserved.

Forgot your password?

Lost your password? Please enter your email address. You will receive mail with link to set new password.

Back to login