These are some of our Frequently Asked Questions

How does good Information and Cybersecurity operate?

Strategically, Information and cybersecurity focus on protecting the Confidentiality, Integrity and Availability (CIA) of an organizations Information assets. How it operates has more to do with establishing, implementing, monitoring and continually improving the security controls within an organization’ information system. It also involves the fundamental practices like periodic risk assessments, vulnerability and patch management, penetration testing, etc.

What are the costs of a cybersecurity attack?

Can companies predict cybercrime rather than simply respond to it?

Predicting the unpredictable is nearly impossible. The more realistic approach is using tools to detect the inevitable breach and containing it ASAP. While these tools may not keep the skilled and well-funded attacker out, they will detect their presence and allow for the organization to remediate/ close the gaps. Without these tools, research has shown that attackers spend an average of 140 days inside an organization before they’re detected. That’s plenty of time for them to find and mine the crown jewels.

I'm a smaller organization, do we really have to worry about hackers?

If recent front-page headlines are anything to go by, then yes, all organizations should be worried. Organizations that don’t move money electronically are less susceptible to financial threats. However, this dose not make them Hackproof. For as long as they continue to process, store and transmit business and customer Information internally or externally, they too are a target.


The capability of cyber criminals to monetize ransomware today has led to an increase in cyberattacks against organizations of all sizes. We see criminal groups infiltrate networks, carry out reconnaissance and plant ransomware directly onto private and corporate information systems to cause maximum damage, and in some rare cases, backups have also been destroyed by the same attackers. By removing all possible recovery elements, the organization is left with literally no choice- ‘Pay or lose the data’. This has been a very effective business model for the hackers.

What is the importance of information security?

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information”. Protects the data the organisation collects and uses.

How can I measure my cyber resilience?

The easiest way to measure your cyber resilience is to do a Cyber Risk Assessment which includes a review and analysis against international security standards and good practices that make for a robust cyber defense. This assessment focuses on key areas of cyber security addressed collectively to deliver a report that is tailored to your organisation. This encompasses a prioritized report of risks, an interactive workshop, and review of the following cyber topics: • Leadership and governance • Assessment against industry best practices and policies. • Threat intelligence and cyber visibility. • Cyber protection and response.

Isn't information security an IT issue?

Information security is an organizational issue, not exclusively an IT issue. IT provides security to central systems and the organizations network. However, much of the risk to information assets can only be managed within units' day-to-day operations. We all share responsibility for properly managing the Organizations information assets.

How do we fund cyber security?

Cyber security will require funding for creating the necessary capabilities that include tools and training for cyber security. However, cyber security must be “baked into” every project, program and management initiative – and not be an administrative afterthought. Cyber security must be understood as an inherent cost of doing business and must be a component of every budget.

Subscribe For Updates

Parliamentary Avenue, Kampala, P.O. Box 23990 Kampala, Uganda

Privacy Policy © 2020 Cognitive Technologies Limited. All Rights Reserved. Design by tony@bulamu.net