Applied Principles Consulting

Applied Principles Consulting is an IT security and IT implementation firm in Uganda with representation in Kenya and Tanzania.

Operating as usual

24/01/2019

Has your organisation suffered from disruption due to data loss or do you need to safely and securely get rid of data?
We offer an extensive range of professional data recovery and destruction(sanitisation) services on all electronic storage devices, including; RAID, SSD, SATA, SCSI, CD & DVD, USB, Mobile Devices, Memory Sticks, etc

24/12/2018

Season's greetings from all of us at Applied Principles.
Merry Christmas!!!

13/12/2018

Applied Principles Consulting thanks you for the opportunity we have had to share our proposition with you.
As the year draws to a close and in a bid to serve you better, we respectfully request for 3 minutes of your time to fill in this short questionnaire.
Your feedback is incredibly important in enabling us improve your experience with Applied Principles Consulting.

https://docs.google.com/forms/d/e/1FAIpQLSdQFnk8zx6iPvAn_Jh2G43bHt6pEuO4QSpNMBaOaJHULfzI8w/viewform

03/12/2018

Defensive security has evolved over time. It's not enough to deploy generic defenses with the hope that they'll combat today's attacks.
We are able to design,develop and deploy various security implementations tailored to your particular environment and needs.
Get in touch with us.

21/11/2018

With the ever-increasing and constantly-evolving slew of cyber threats,it's now more important than ever to ensure that your organization's digital defenses are up to the task. At Applied Principles, we carry out cyber attack simulations aimed at testing and improving your organization's readiness.
Contact us to find out how.

08/11/2018

Applied Principles Consulting's cover photo

07/11/2018

Who/What is #AppliedPrinciplesConsulting?

READ MORE:

https://www.principlesapplied.com/about_us.html

07/11/2018

Applied Principles Consulting's cover photo

05/11/2018

Applied Principles Consulting

12/06/2018

Tuesday Tip
#ScadaSystems
#AppliedPrinciples

06/06/2018

Join the conversation this month as we delve deeper into our monthly topic "Scada Systems"

#InformationSecurity
#AppliedPrinciplesConsulting

06/06/2018

Profile Pictures

06/06/2018

Applied Principles Consulting

[01/23/18]   We are strongly-Focused on delivering Innovative Solutions and developing long-term partnerships that achieve positive results across this Market.

Our incorruptible nature complimented by our strength in Innovation provide the foundation of High quality cost effective solutions. Visit us today.

bbc.com 24/10/2017

FBI locked out of 7,000 encrypted devices

Agents at the US Federal Bureau of Investigation (FBI) have been unable to extract data from nearly 7,000 mobile devices they have tried to access, the agency's director has said.
Christopher Wray said encryption on devices was "a huge, huge problem" for FBI investigations.
The agency had failed to access more than half of the devices it targeted in an 11-month period, he said.
One cyber-security expert said such encryption was now a "fact of life".

Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data.
Such encryption is different to end-to-end encryption, which prevents interception of communications on a large scale.
Cyber-security expert Prof Alan Woodward at the University of Surrey said device encryption was clearly frustrating criminal investigations but it would be impractical and insecure to develop "back doors" or weakened security.

Trade-off
"Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies," he said.
"Even if the equipment manufacturers didn't build in such encryption it would be possible to obtain software that encrypted data in the same way."
Referring to the trade-off between cyber-security and investigative hacking, the FBI director said: "I get it, there's a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe."
Mr Wray was speaking at the International Association of Chiefs of Police conference in Philadelphia on Sunday.
In 2016, the FBI asked Apple to unlock an iPhone used by San Bernardino killer Syed Rizwan Farook.
Apple refused, explaining that its phones had been designed so that even their manufacturer could not access them once encrypted.
The FBI later said a third party firm had discovered a way of breaking into Farook's device.
Earlier this month, a federal judge ruled that the FBI did not have to reveal the identity of the firm or how much the agency paid for its services.
The ruling followed freedom of information requests filed by journalists.

bbc.com Encryption has become "a huge, huge problem" for investigations, the FBI director says.

principlesapplied.com 13/10/2017

Richard Branson invests in the hyperloop | Applied Principles Consulting

principlesapplied.com Richard Branson announced Thursday that he is investing in Hyperloop One, a startup developing a futuristic high-speed transportation system first dreamed up by Tesla (TSLA) and SpaceX CEO Elon Musk.

bbc.com 06/10/2017

China set to launch an 'unhackable' net

China is about to launch a new, "unhackable" communications network - at least in the sense that any attack on it would be quickly detected.

The technology it has turned to is quantum cryptography, a radical break from the traditional encryption methods around. The Chinese project in the city of Jinan has been touted as a milestone by state media.
The pioneering project is also part of a bigger story: China is taking the lead in a technology in which the West has long been hesitant to invest.
In the Jinan network, some 200 users from the military, government, finance and electricity sectors will be able to send messages safe in the knowledge that only they are reading them.

China's push in quantum communication means the country is taking huge strides developing applications that might make the increasingly vulnerable internet more secure. Applications that other countries soon might find themselves buying from China.
So, what is this technology into which the country is pouring massive resources?

'Unhackable' communication
If you send a message you want to keep secure from eavesdroppers, traditional encryption works by hiding the key needed to read the message in a very difficult mathematical problem.

But what is "difficult" in terms of maths? It means you have to think really fast to figure it out as you try endless combinations of long, numeric keys. In 2017, that means you need to use a very powerful computer.

Cyber-offenders put through rehab camp
Cash machine hacked in five minutes
Staging security at the National Theatre
The mindset you need to avoid cyber-crime
Steady improvements in computer power mean that the number-based keys have to be lengthened periodically. Encryption has a shelf life and is rapidly becoming more vulnerable.
There are also fears that the development of quantum computers, which effectively represent a massive step change in number crunching ability, will render much of modern encryption software vulnerable.

Quantum communication works differently:
If you want to send your secure message, you first separately send a key embedded in particles of light
Only then do you send your encrypted message and the receiver will be able to read it with the help of the key sent beforehand

The crucial advantage of this so-called quantum key distribution is that if anyone tries to intercept the light particles, they necessarily alter or destroy them.
What this means is that any attempt at hacking will immediately be noticed by the original sender and the intended receiver - hence its description as "unhackable".
Leaving the West behind

If quantum communication can help to secure online communications, why is China so far ahead?
"For a long time people simply didn't think it was needed," says Prof Myungshik Kim of Imperial College, London, adding that it was not clear whether there was a commercial market for this technology.

"The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology," he says.
The research itself is not new and China does not have an edge over the competition. Where it does have an advantage is when it comes to applications.

"Europe has simply missed the boat," says Prof Anton Zeilinger, a quantum physicist at Vienna University in Austria and a pioneer in the field.

He says he tried to convince the EU as early as 2004 to fund more quantum-based projects but it had little effect.
"Europe has been dragging its feet and this has hindered us from being able to compete," he says.
There are quantum key-based networks operating in the US and Europe but most are being carried out as research projects, rather than with commercial partners.

bbc.com China might not have the lead in research but its application of secure networks is leading the way.

principlesapplied.com 14/09/2017

iPhone X’s new security feature will make work harder for detectives and forensics experts. | Applied Principles Consulting

principlesapplied.com While great for consumers, without the ability to bypass enhanced security such as facial recognition, investigators said it will delay justice.

07/09/2017

Google has redesigned its Street View camera system so that it can take clearer images and capture more data about shops and buildings.

The new hardware takes clearer panoramic photos, while two high definition cameras capture detailed images of shops and street signs.

Data such as shop opening hours can be spotted by machine-learning algorithms and included in search results.

It is the first major update to the Street View hardware in eight years.

Google said the improved cameras would produce brighter and more colourful images, with less-noticeable seams where the images had been "stitched together" to produce a 360-degree panorama.

It said it had captured images of more than 10 million miles of road, and more than 80 billion photos, since launching Street View, in 2007.

It has previously improved the quality of the cameras on its Street View vehicles, but the company told Wired that people were now asking "harder and deeper questions" such as "What's the name of the shop on the corner?"

http://www.bbc.com/news/technology-41082920

yahoo.com 01/09/2017

Kenyan court overturns presidential election after claims results were hacked

Kenyan court overturns presidential election after claims results were hacked

yahoo.com Kenyan court overturns presidential election after claims results were hacked

31/08/2017

Gain control of your DATA security today. No matter the location of your corporate information (on premise, cloud, mobile). We prevent leakage or unauthorized disclosure of your trade and customer information. Stop the insider theft and leakage of your corporate information through skype, email, chat applications, external devices.

principlesapplied.com 28/08/2017

TECH | East Africa is leading the world in drone delivery | Applied Principles Consulting

Great Technology In our backyard

The cutting edge of drone delivery isn’t one of the usual technology hotspots, such as Singapore or the United States. The honor belongs to East Africa

A second East African nation announced Thursday it will launch a fully automated drone delivery program. The drones will fly themselves, far from the view of humans — a move that’s not yet legal in the U.S. While plenty of countries have dabbled in drone delivery, no program has matched the scale and impact of what’s unfolding in Rwanda and now, Tanzania.

principlesapplied.com A second East African nation announced Thursday it will launch a fully automated drone delivery program. The drones will fly themselves, far from the view of humans — a move that’s not yet legal in the U.S. While plenty of countries have dabbled in drone delivery, no program has matched the scale an...

principlesapplied.com 25/08/2017

How hackers are targeting the shipping industry | Applied Principles Consulting

When staff at CyberKeel investigated email activity at a medium-sized shipping firm, they made a shocking discovery

“Someone had hacked into the systems of the company and planted a small virus,” explains co-founder Lars Jensen. “They would then monitor all emails to and from people in the finance department.”

Whenever one of the firm’s fuel suppliers would send an email asking for payment, the virus simply changed the text of the message before it was read, adding a different bank account number.

principlesapplied.com “Someone had hacked into the systems of the company and planted a small virus,” explains co-founder Lars Jensen. “They would then monitor all emails to and from people in the finance department.”

23/08/2017

Have you considered Data classification, Data Leakage Prevention, Data Encryption, IP protection? Is your organization’s most valuable information REALLY PROTECTED?

We have the right answers. Contact us to control your DATA security today. No matter the location of your corporate information (on premise, cloud, mobile). We prevent leakage or unauthorized disclosure of your trade and customer information. Stop the insider theft and leakage of your corporate information through skype, email, chat applications, external devices, etc

principlesapplied.com 22/08/2017

Is Africa becoming more Vulnerable to Cyber-attacks? | Applied Principles Consulting

Although a big percentage of business and government entities in Africa is still underestimating the role of Information Security and Digital Forensics companies, Africa might be at it’s most vulnerable stages in the digital era.

The forces of demand and supply are consistently pushing business owners and service providers to the web, forcing them to replace their analog with digital platforms. However, it is easy for entities to move without putting into consideration the dangers this might cause in terms of security risk. Before you switch however, The question you should ask yourself is, Am I relay ready to switch?

Let’s take the example of the recently concluded presidential elections in Kenya, by the time the provisional results were released by the Independent Electoral and Boundaries Commission (IEBC) on 10th August 2017, Mr. Kenyatta had a lead of more than 1.4m votes — or nearly 10 per cent — after nearly all ballots had been tallied..

principlesapplied.com Although a big percentage of business and government entities in Africa is still underestimating the role of Information Security and Digital Forensics companies, Africa might be at it’s most vulnerable stages in the digital era.

16/08/2017

"Navigating the Accelerated Cyber Threat Landscape requires you identify areas of exposure; here is your threat landscape.."

Speaking this afternoon at ISACA's annual information Security Conference, the CEO of Applied Principles Consulting John Patrick Okiring

16/08/2017

#INFOSEC_EA Happening now. CEO of Applied Principles Consulting shares a light moment with Ronald Bakakimpa of UCC at the #EAInfosec17

10/08/2017

We have moved to a more spacious location. Applied principles Consulting Limited is now located at Plot 69 Bukoto street Kololo, P .O Box 36429, Kampala Uganda, [email protected].
com,[email protected]
For more information. call +256 75 661 94 55, +256 789 099 540

financialexpress.com 10/08/2017

Cyber security: RBI has asked banks to go for periodic vulnerability test, government tells Parliament

CYBER SECURITY: The reserve Bank of India (RBI) asks banks to conduct periodic vulnerability tests.

The Reserve Bank of India prides in it's work of issuing Bank notes and keeping reserves, with an aim of securing monetary stability in India and generally to operate the currency and credit system of the country.

According to the Reserve Bank of India, 'WannaCry' ransomware attacks were reported from banks during May and June of 2017 and a few computers in two bank branches and one ATM unit were impacted "though no data loss was reported"

In a written reply to the Rajya Sabha, Minister of State for Finance Santosh Kumar Gangwar said the RBI has issued Cyber Security Framework in Banks to help them deal with any future cbyer attacks.

Cyber security preparedness is a continuous activity and the RBI has asked banks to periodically conduct vulnerability tests
"The RBI had issued advisories to banks in relation to ransomware attacks, regarding application of relevant patches in and update of anti-virus software for all systems,"

http://www.financialexpress.com/industry/banking-finance/cyber-security-rbi-has-asked-banks-to-go-for-periodic-vulnerability-test-government-tells-parliament/799297/

financialexpress.com Cyber security preparedness is a continuous activity and the RBI has asked banks to periodically conduct vulnerability test, the finance ministry said today.

principlesapplied.com 23/01/2017

International cyber security conference heads to Hamilton | Applied Principles Consulting

principlesapplied.com

principlesapplied.com 16/01/2017

Cyber security takes centre stage in the age of Trump | Applied Principles Consulting

principlesapplied.com

principlesapplied.com 05/01/2017

Donald Trump: New attack on US intelligence over Russia hacking | Applied Principles Consulting

principlesapplied.com

principlesapplied.com 20/12/2016

Russia claims it is being targeted for cyber strikes by foreign services, following US election | Applied Principles Consulting

principlesapplied.com

principlesapplied.com 14/12/2016

Trump invites top tech leaders to NYC | Applied Principles Consulting

principlesapplied.com

Products

Information Security, Digital Forensics, I.T. Security Testing and Training, mobile application development and I.T. Consulting

Telephone

Address


Plot 69 Bukoto Street
Kampala
P.O.BOX 36429, KAMPALA, UGANDA

Opening Hours

Monday 08:00 - 17:00
Tuesday 08:00 - 17:00
Wednesday 08:00 - 17:00
Thursday 08:00 - 17:00
Friday 08:00 - 17:00
Other Computer Companies in Kampala (show all)
Wazi Group Limited Wazi Group Limited
Third Floor Suite T11, Fairhouse, Nasser Rd, Kampala, Uganda
Kampala, 256

Providing Printing and branding solutions that work for your business.

BetaSoft Technologies & Graphics Designer Ltd. BetaSoft Technologies & Graphics Designer Ltd.
P.O.Box 30723 Nasser Road Kampala Plot 29A-B, PRINTER’S ARCADE UPPER FLOOR
Kampala, 256

DEALING IN:General Printing of Booklets,All Types of Cards Posters & Sign Posts T-Shirts & Banners Receipts, Invoice & Tickets Calendars, IDs & Stickers Selling of Stationery Computer Training Software Installations IT Support services Computer Repair etc

Talent X Talent X
P. O. Box 1137 Kampala
Kampala, 256

Showcasing ICT Innovations. Talent X is here to see you prosper in ICT project research.

PALM PESA Limited PALM PESA Limited
Luwum Street
Kampala, +256

We believe in working with our clients to achieve the most without compromising their comfort...

KAINGroup Ltd. KAINGroup Ltd.
USSIA House
Kampala, 256

KAINGroup Ltd. is a total IT service delivery and consultancy company. The company was conceived in 2008 and incorporated in 2009 by a team of highly trained and talented professionals

Selling computers,video coverage,and Editing Photos Selling computers,video coverage,and Editing Photos
Off Entebbe Road After Kibye Round And We Are Opposite Hotel The Castle.
Kampala, 256

For more information please email us at [email protected] .Other contacts;0704809928(IT Support Technician)

ARK Cloud Technologies Limited ARK Cloud Technologies Limited
Kampala, P.O.BOX 28649

Megadata Solutions LTD Megadata Solutions LTD
PLOT 1 OLD KAMPALA, CHICHEN HOUSE BUILDING SUITE 2 AND 3
Kampala, 256

Mega Data Solutions Ltd. is a private limited company that deals in ICT works, Electrical and Civil works.

Redlyric Redlyric
Kampala, +256

I'll post my favorite lyrics, edited in my own way! Hope you enjoy watching the videos here! Please LIKE

ALIEN Technology  wandegeya, Kampala ALIEN Technology wandegeya, Kampala
Wandegeya
Kampala

computer repair,Laptop repair, phone repair,Tablet repair software development and networking.

Softech Innovations Softech Innovations
Mutebi II Road, Kibuye.
Kampala, 256

For dependable and customized software to help in your daily business needs

Cured Ltd Cured Ltd
Suit 24, 2nd Floor, Capital Shoppers Building Nakawa OPP MUBS UNIVERSITY
Kampala, P. O. BOX 26912. KAMPALA, UGANDA

Cured Ltd is an IT firm and an authorized Kaspersky Anti-Virus Reseller.