Featured Articles
Phishing Scams
Of recent, phishing is becoming more common and more sophisticated. A recent Microsoft Security Intelligence Report states that phishing attacks are by far the most frequent threat to
Phishing Scams
Of recent, phishing is becoming more common and more sophisticated. A recent Microsoft Security Intelligence Report states that phishing attacks are by far the most frequent threat to

Cybercrime is a constant business: Three business areas to watch out for! “Malicious attackers take

Is your remote working secure? R emote-working (teleworking) is a must for several enterprises to

Intellectual Property Protection One of the principal responsibilities of cybersecurity professionals is protecting the intellectual

Featured Articles The Biggest Cybersecurity Targets Organizations have a number of digital assets that cybercriminals

Featured Articles Phishing Scams Of recent, phishing is becoming more common and more sophisticated. A

Featured Articles The Unexpected cyber threats Online communication involves two people or organizations doing business

Download and view the training calendar program for the year 2021. Intakes start in January 2021

In line with our strategy to support the fight against the everincreasing threat of cybercrime, effective 2018, Summit Consulting Ltd has launched the “FRONTLINE” project to streamline the act of security assessments.

A padlock on a chicken coop means nothing if the fox has the keys. In

A monkey tied to a tree still thinks it is free. That is the modern

The issue is: Time is not money, it is evidence On 26th February 2025, the

Most people think hackers wear hoodies and speak in code. That’s Hollywood nonsense. Real hackers

You don’t need a high-tech vault. You just need to stop being sloppy. Most small

The incident On the morning of 3rd March 2024, a mid-sized logistics company based in

In fraud investigations, perception is not enough. You need precision. If your report can not

When things go wrong internally; fraud, harassment, data leaks, ghost workers, it is not what
A dedicated team of staff are waiting to answer your inquiries.
Please submit an inquiry.
© All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd
There was a problem reporting this post.
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.