Applied Principles Consulting is an IT security and IT implementation firm in Uganda with representation in Kenya and Tanzania.
Operating as usual
Has your organisation suffered from disruption due to data loss or do you need to safely and securely get rid of data?
We offer an extensive range of professional data recovery and destruction(sanitisation) services on all electronic storage devices, including; RAID, SSD, SATA, SCSI, CD & DVD, USB, Mobile Devices, Memory Sticks, etc
Season's greetings from all of us at Applied Principles.
Applied Principles Consulting thanks you for the opportunity we have had to share our proposition with you.
As the year draws to a close and in a bid to serve you better, we respectfully request for 3 minutes of your time to fill in this short questionnaire.
Your feedback is incredibly important in enabling us improve your experience with Applied Principles Consulting.
Defensive security has evolved over time. It's not enough to deploy generic defenses with the hope that they'll combat today's attacks.
We are able to design,develop and deploy various security implementations tailored to your particular environment and needs.
Get in touch with us.
With the ever-increasing and constantly-evolving slew of cyber threats,it's now more important than ever to ensure that your organization's digital defenses are up to the task. At Applied Principles, we carry out cyber attack simulations aimed at testing and improving your organization's readiness.
Contact us to find out how.
Applied Principles Consulting's cover photo
Who/What is #AppliedPrinciplesConsulting?
Applied Principles Consulting's cover photo
Applied Principles Consulting
Join the conversation this month as we delve deeper into our monthly topic "Scada Systems"
Applied Principles Consulting
We are strongly-Focused on delivering Innovative Solutions and developing long-term partnerships that achieve positive results across this Market.
Our incorruptible nature complimented by our strength in Innovation provide the foundation of High quality cost effective solutions. Visit us today.
Agents at the US Federal Bureau of Investigation (FBI) have been unable to extract data from nearly 7,000 mobile devices they have tried to access, the agency's director has said.
Christopher Wray said encryption on devices was "a huge, huge problem" for FBI investigations.
The agency had failed to access more than half of the devices it targeted in an 11-month period, he said.
One cyber-security expert said such encryption was now a "fact of life".
Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data.
Such encryption is different to end-to-end encryption, which prevents interception of communications on a large scale.
Cyber-security expert Prof Alan Woodward at the University of Surrey said device encryption was clearly frustrating criminal investigations but it would be impractical and insecure to develop "back doors" or weakened security.
"Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies," he said.
"Even if the equipment manufacturers didn't build in such encryption it would be possible to obtain software that encrypted data in the same way."
Referring to the trade-off between cyber-security and investigative hacking, the FBI director said: "I get it, there's a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe."
Mr Wray was speaking at the International Association of Chiefs of Police conference in Philadelphia on Sunday.
In 2016, the FBI asked Apple to unlock an iPhone used by San Bernardino killer Syed Rizwan Farook.
Apple refused, explaining that its phones had been designed so that even their manufacturer could not access them once encrypted.
The FBI later said a third party firm had discovered a way of breaking into Farook's device.
Earlier this month, a federal judge ruled that the FBI did not have to reveal the identity of the firm or how much the agency paid for its services.
The ruling followed freedom of information requests filed by journalists.
bbc.com Encryption has become "a huge, huge problem" for investigations, the FBI director says.
principlesapplied.com Richard Branson announced Thursday that he is investing in Hyperloop One, a startup developing a futuristic high-speed transportation system first dreamed up by Tesla (TSLA) and SpaceX CEO Elon Musk.
China is about to launch a new, "unhackable" communications network - at least in the sense that any attack on it would be quickly detected.
The technology it has turned to is quantum cryptography, a radical break from the traditional encryption methods around. The Chinese project in the city of Jinan has been touted as a milestone by state media.
The pioneering project is also part of a bigger story: China is taking the lead in a technology in which the West has long been hesitant to invest.
In the Jinan network, some 200 users from the military, government, finance and electricity sectors will be able to send messages safe in the knowledge that only they are reading them.
China's push in quantum communication means the country is taking huge strides developing applications that might make the increasingly vulnerable internet more secure. Applications that other countries soon might find themselves buying from China.
So, what is this technology into which the country is pouring massive resources?
If you send a message you want to keep secure from eavesdroppers, traditional encryption works by hiding the key needed to read the message in a very difficult mathematical problem.
But what is "difficult" in terms of maths? It means you have to think really fast to figure it out as you try endless combinations of long, numeric keys. In 2017, that means you need to use a very powerful computer.
Cyber-offenders put through rehab camp
Cash machine hacked in five minutes
Staging security at the National Theatre
The mindset you need to avoid cyber-crime
Steady improvements in computer power mean that the number-based keys have to be lengthened periodically. Encryption has a shelf life and is rapidly becoming more vulnerable.
There are also fears that the development of quantum computers, which effectively represent a massive step change in number crunching ability, will render much of modern encryption software vulnerable.
Quantum communication works differently:
If you want to send your secure message, you first separately send a key embedded in particles of light
Only then do you send your encrypted message and the receiver will be able to read it with the help of the key sent beforehand
The crucial advantage of this so-called quantum key distribution is that if anyone tries to intercept the light particles, they necessarily alter or destroy them.
What this means is that any attempt at hacking will immediately be noticed by the original sender and the intended receiver - hence its description as "unhackable".
Leaving the West behind
If quantum communication can help to secure online communications, why is China so far ahead?
"For a long time people simply didn't think it was needed," says Prof Myungshik Kim of Imperial College, London, adding that it was not clear whether there was a commercial market for this technology.
"The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology," he says.
The research itself is not new and China does not have an edge over the competition. Where it does have an advantage is when it comes to applications.
"Europe has simply missed the boat," says Prof Anton Zeilinger, a quantum physicist at Vienna University in Austria and a pioneer in the field.
He says he tried to convince the EU as early as 2004 to fund more quantum-based projects but it had little effect.
"Europe has been dragging its feet and this has hindered us from being able to compete," he says.
There are quantum key-based networks operating in the US and Europe but most are being carried out as research projects, rather than with commercial partners.
bbc.com China might not have the lead in research but its application of secure networks is leading the way.
principlesapplied.com While great for consumers, without the ability to bypass enhanced security such as facial recognition, investigators said it will delay justice.
Google has redesigned its Street View camera system so that it can take clearer images and capture more data about shops and buildings.
The new hardware takes clearer panoramic photos, while two high definition cameras capture detailed images of shops and street signs.
Data such as shop opening hours can be spotted by machine-learning algorithms and included in search results.
It is the first major update to the Street View hardware in eight years.
Google said the improved cameras would produce brighter and more colourful images, with less-noticeable seams where the images had been "stitched together" to produce a 360-degree panorama.
It said it had captured images of more than 10 million miles of road, and more than 80 billion photos, since launching Street View, in 2007.
It has previously improved the quality of the cameras on its Street View vehicles, but the company told Wired that people were now asking "harder and deeper questions" such as "What's the name of the shop on the corner?"
Kenyan court overturns presidential election after claims results were hacked
yahoo.com Kenyan court overturns presidential election after claims results were hacked
Gain control of your DATA security today. No matter the location of your corporate information (on premise, cloud, mobile). We prevent leakage or unauthorized disclosure of your trade and customer information. Stop the insider theft and leakage of your corporate information through skype, email, chat applications, external devices.
Great Technology In our backyard
The cutting edge of drone delivery isn’t one of the usual technology hotspots, such as Singapore or the United States. The honor belongs to East Africa
A second East African nation announced Thursday it will launch a fully automated drone delivery program. The drones will fly themselves, far from the view of humans — a move that’s not yet legal in the U.S. While plenty of countries have dabbled in drone delivery, no program has matched the scale and impact of what’s unfolding in Rwanda and now, Tanzania.
principlesapplied.com A second East African nation announced Thursday it will launch a fully automated drone delivery program. The drones will fly themselves, far from the view of humans — a move that’s not yet legal in the U.S. While plenty of countries have dabbled in drone delivery, no program has matched the scale an...
When staff at CyberKeel investigated email activity at a medium-sized shipping firm, they made a shocking discovery
“Someone had hacked into the systems of the company and planted a small virus,” explains co-founder Lars Jensen. “They would then monitor all emails to and from people in the finance department.”
Whenever one of the firm’s fuel suppliers would send an email asking for payment, the virus simply changed the text of the message before it was read, adding a different bank account number.
principlesapplied.com “Someone had hacked into the systems of the company and planted a small virus,” explains co-founder Lars Jensen. “They would then monitor all emails to and from people in the finance department.”
Have you considered Data classification, Data Leakage Prevention, Data Encryption, IP protection? Is your organization’s most valuable information REALLY PROTECTED?
We have the right answers. Contact us to control your DATA security today. No matter the location of your corporate information (on premise, cloud, mobile). We prevent leakage or unauthorized disclosure of your trade and customer information. Stop the insider theft and leakage of your corporate information through skype, email, chat applications, external devices, etc
Although a big percentage of business and government entities in Africa is still underestimating the role of Information Security and Digital Forensics companies, Africa might be at it’s most vulnerable stages in the digital era.
The forces of demand and supply are consistently pushing business owners and service providers to the web, forcing them to replace their analog with digital platforms. However, it is easy for entities to move without putting into consideration the dangers this might cause in terms of security risk. Before you switch however, The question you should ask yourself is, Am I relay ready to switch?
Let’s take the example of the recently concluded presidential elections in Kenya, by the time the provisional results were released by the Independent Electoral and Boundaries Commission (IEBC) on 10th August 2017, Mr. Kenyatta had a lead of more than 1.4m votes — or nearly 10 per cent — after nearly all ballots had been tallied..
principlesapplied.com Although a big percentage of business and government entities in Africa is still underestimating the role of Information Security and Digital Forensics companies, Africa might be at it’s most vulnerable stages in the digital era.
"Navigating the Accelerated Cyber Threat Landscape requires you identify areas of exposure; here is your threat landscape.."
Speaking this afternoon at ISACA's annual information Security Conference, the CEO of Applied Principles Consulting John Patrick Okiring
#INFOSEC_EA Happening now. CEO of Applied Principles Consulting shares a light moment with Ronald Bakakimpa of UCC at the #EAInfosec17
We have moved to a more spacious location. Applied principles Consulting Limited is now located at Plot 69 Bukoto street Kololo, P .O Box 36429, Kampala Uganda, [email protected].
For more information. call +256 75 661 94 55, +256 789 099 540
CYBER SECURITY: The reserve Bank of India (RBI) asks banks to conduct periodic vulnerability tests.
The Reserve Bank of India prides in it's work of issuing Bank notes and keeping reserves, with an aim of securing monetary stability in India and generally to operate the currency and credit system of the country.
According to the Reserve Bank of India, 'WannaCry' ransomware attacks were reported from banks during May and June of 2017 and a few computers in two bank branches and one ATM unit were impacted "though no data loss was reported"
In a written reply to the Rajya Sabha, Minister of State for Finance Santosh Kumar Gangwar said the RBI has issued Cyber Security Framework in Banks to help them deal with any future cbyer attacks.
Cyber security preparedness is a continuous activity and the RBI has asked banks to periodically conduct vulnerability tests
"The RBI had issued advisories to banks in relation to ransomware attacks, regarding application of relevant patches in and update of anti-virus software for all systems,"
financialexpress.com Cyber security preparedness is a continuous activity and the RBI has asked banks to periodically conduct vulnerability test, the finance ministry said today.
|Monday||08:00 - 17:00|
|Tuesday||08:00 - 17:00|
|Wednesday||08:00 - 17:00|
|Thursday||08:00 - 17:00|
|Friday||08:00 - 17:00|
Providing Printing and branding solutions that work for your business.
DEALING IN:General Printing of Booklets,All Types of Cards Posters & Sign Posts T-Shirts & Banners Receipts, Invoice & Tickets Calendars, IDs & Stickers Selling of Stationery Computer Training Software Installations IT Support services Computer Repair etc
Showcasing ICT Innovations. Talent X is here to see you prosper in ICT project research.
We believe in working with our clients to achieve the most without compromising their comfort...
KAINGroup Ltd. is a total IT service delivery and consultancy company. The company was conceived in 2008 and incorporated in 2009 by a team of highly trained and talented professionals
For more information please email us at [email protected] .Other contacts;0704809928(IT Support Technician)
Mega Data Solutions Ltd. is a private limited company that deals in ICT works, Electrical and Civil works.
I'll post my favorite lyrics, edited in my own way! Hope you enjoy watching the videos here! Please LIKE
computer repair,Laptop repair, phone repair,Tablet repair software development and networking.
For dependable and customized software to help in your daily business needs
Cured Ltd is an IT firm and an authorized Kaspersky Anti-Virus Reseller.