Joshua Twinamasiko G, Author at PC Tech Magazine https://pctechmag.com/author/joshtwin/ Uganda Technology News, Analysis & Product Reviews Sun, 21 Jul 2024 14:10:57 +0000 en-US hourly 1 https://i0.wp.com/pctechmag.com/wp-content/uploads/2015/08/pctech-subscribe.png?fit=32%2C32&ssl=1 Joshua Twinamasiko G, Author at PC Tech Magazine https://pctechmag.com/author/joshtwin/ 32 32 168022664 OP-ED: Navigating Cybersecurity Challenges in Wildlife Conservation https://pctechmag.com/2024/07/navigating-cybersecurity-challenges-in-wildlife-conservation/ Tue, 16 Jul 2024 21:00:42 +0000 https://pctechmag.com/?p=77021 As we continue to advance in our conservation efforts through technology, staying vigilant against these cybersecurity threats is imperative.

The post OP-ED: Navigating Cybersecurity Challenges in Wildlife Conservation appeared first on PC Tech Magazine.

]]>
In my work at the Uganda Conservation Foundation (UCF) and by extension, the Uganda Wildlife Authority (UWA), I’ve witnessed a remarkable shift towards integrating cutting-edge conservation technology into the core of operations. The role of technology in wildlife conservation has become more prominent than ever in recent years.

For over 20 years, UCF has been investing heavily in infrastructure in Uganda’s largest national parks, through initiatives like The Recovery of Murchison Falls National Park and the Recovery of Queen Elizabeth National Park Programmes, and various initiatives in Kidepo Valley National Park. The foundation has designed, built, furnished, and equipped three Joint Operations Command Centers, centralizing the management of the respective parks and bringing together the different arms of park operations. More importantly, these centers seamlessly connect them through advanced technology, including direct connections with the UWA headquarters in Kampala.

Strategic investments have been made in communications infrastructure, ensuring connectivity across the parks. EarthRanger, the park management system of choice across Africa, has been successfully deployed. This integration aids top management in overseeing and supporting park operations effectively. Park management can now monitor events in real-time, offering numerous benefits and risks. But I’ll delve into more detail on this another time!

Fortunately, security has been a priority for top management throughout these advancements. As we embrace these technological benefits, we continue to implement measures to counter cybersecurity threats, safeguarding our national parks, UWA staff, assets, and the invaluable tourists who contribute to the country’s economy.

Here are the top 3 cybersecurity threats that I believe conservationists will have to contend with:

  1. Inadequate Security Protocols: The digitization of many processes, systems, data, and information brings unprecedented convenience and ease of access to users.

Unfortunately, this is a double-edged sword. In the event of unauthorized access, an attacker can exploit weak security protocols, potentially causing significant harm. For example, sensitive data on wildlife movements, anti-poaching strategies, investigations, and ranger deployments can be compromised, endangering both wildlife and personnel. Establishing robust security protocols, regular audits, and continuous monitoring are critical to mitigating these risks.

  1. Lack of Standardization: With the rapid deployment of various technologies across different parks, a lack of standardization can lead to significant vulnerabilities.

Different systems and devices may have varying security features, creating inconsistencies that attackers can exploit. For example, if one park uses a different communication protocol or outdated software, it can become a weak link in an otherwise secure network.

Additionally, this lack of standardization poses practical challenges for staff. If staff members are transferred between parks, they would have to learn entirely new systems, which can lead to inefficiencies and increased risk of errors. At the headquarters, trying to monitor or interpret reports coming from different systems across multiple parks becomes a daunting task. The inconsistencies can lead to delays in critical decision-making and make it harder to maintain a comprehensive security posture.

Establishing and adhering to standardized security practices and protocols across all operations is essential to creating a unified and resilient defense against cyber threats. Standardization ensures that all staff, regardless of their location or role, are familiar with the same systems and procedures, enhancing both efficiency and security.

  1. Human Error: Human error remains one of the most significant cybersecurity threats. Employees and volunteers, while well-meaning, can inadvertently create security breaches through actions such as using weak passwords, falling for phishing scams, or misconfiguring systems.

Continuous training and awareness programs are vital to educating staff about best cybersecurity practices. Ensuring that all personnel understand the importance of cybersecurity and are equipped to recognize and respond to potential threats is crucial.

UCF addresses this through frequently engaging with UWA staff, both in the field on an ongoing basis, as well as formal training sessions facilitated by the world’s top experts on the relevant subject matters.

Bonus: Insider Threats

Insider threats are a common challenge across all industries, not just in conservation. These threats can arise from disgruntled employees or individuals with malicious intent who have legitimate access to systems and data, making it easier for them to cause harm, intentionally or unintentionally.

It’s also important to consider past employees, as they may retain knowledge or access that could be exploited if not properly managed. Implementing strict access controls, monitoring user activities, and fostering a positive work environment are essential strategies to mitigate this threat.

Additionally, the offboarding process must be handled with care to ensure that departing employees do not retain access to sensitive systems or information. This includes revoking access rights, retrieving organization-owned devices, and ensuring that any residual access points are closed.

Encouraging current staff to report suspicious behavior and ensuring there are clear protocols for handling such reports can further enhance security. It’s important to note that the majority of employees are well-intentioned, and these measures are about safeguarding the collective mission and integrity of the organization.

As we continue to advance in our conservation efforts through technology, staying vigilant against these cybersecurity threats is imperative. By addressing these challenges head-on, we can ensure the safety and security of our national parks, the dedicated individuals who work to protect them, and the diverse wildlife that calls these parks home.

The post OP-ED: Navigating Cybersecurity Challenges in Wildlife Conservation appeared first on PC Tech Magazine.

]]>
77021
Staying Safe on Public Wi-Fi, Nothing too Technical, Just Some Simple Things https://pctechmag.com/2024/02/staying-safe-on-public-wi-fi-nothing-too-technical-just-simple-steps/ Tue, 06 Feb 2024 12:21:52 +0000 https://pctechmag.com/?p=74340 We have made a big fuss about Wi-Fi at the airport, at the event venue, and select hotels.…

The post Staying Safe on Public Wi-Fi, Nothing too Technical, Just Some Simple Things appeared first on PC Tech Magazine.

]]>
We have made a big fuss about Wi-Fi at the airport, at the event venue, and select hotels. We have held press conferences; we have had high-profile individuals testing the waters — or rather the Wi-Fi!

Granted, a lot of the fuss is about Wi-Fi 6, the latest generation of Wi-Fi technology. It’s designed to be faster, more efficient, and supports the latest security protocols, but I’m not convinced that as a country we should be making so much fuss over something like this. I’d be more enthusiastic if for example it was invented by a Ugandan, or it was new.

But anyway, for today, I will not get into technical details of Wi-Fi, 6 or otherwise, or even the particular installations that have made headlines recently. What caught my attention is the fact that the majority of users are oblivious to the risks and potential threats of using public Wi-Fi.

We often see memes about a power outlet and Wi-Fi being the first things a person looks for wherever they stop, whether it’s at home, a hotel, a restaurant, or visiting friends. Sometimes we are the aforementioned people! Very often they will log on and do everything that they couldn’t do while economizing their mobile internet bundle. But little do they know the risk they are taking!

A chill ran down my spine at the sight of several high-ranking government officials’ heads bowed, engrossed in their smartphones, testing the Wi-Fi at the airport. Most of them probably have no idea what precautions to take to keep safe, just like the average internet user at a hotel or restaurant.

As a self-proclaimed Digital Evangelist on a mission to champion a Digital-First lifestyle, I feel I must address this gap in awareness and share a few simple tips to help keep secure when dealing with public Wi-Fi. Nothing too technical, just some simple things that everyone who owns a smartphone or laptop can make sense of, regardless of technical expertise:

  1. Use a VPN

Thanks to the 2021 events, most of us in Uganda will have at least one VPN app installed on our smartphone or computer. When on public Wi-Fi, this is a really good time to ensure it’s activated!

  1. Confirm you are connecting to the correct network

If you check and there are many networks with similar names, it’s best that you check with the establishment, whether it’s a restaurant or hotel to confirm which one is the right one to avoid falling victim to a fake network set up by cybercriminals.

  1. Avoid accessing sensitive information

While you’re on public Wi-Fi, try as much as possible not to access your online banking or sensitive personal or work data. Save those for when you are on a known, secure network.

  1. Do not connect to less secure networks

Sometimes your device will alert you that the network you’re trying to connect to “uses an older security standard that might not protect you.” How about you believe your computer and stay off that network?

  1. Disable Filesharing and Airdrop

When on public Wi-Fi, with lots of strangers connected, that’s not the time to start sharing files. Keep filesharing and discovery turned off. Fortunately, most devices will have them off when you connect to public Wi-Fi by default.

Bonus point:

Just stay off public Wi-Fi altogether. Turn off Wi-Fi, and check your settings to make sure your device isn’t in the background “scanning for high-quality networks” or finding nearby devices. Turn off Bluetooth when you’re not using it. Just stay away! Exercise caution and prioritize your device’s security over the allure of free GBs.

The post Staying Safe on Public Wi-Fi, Nothing too Technical, Just Some Simple Things appeared first on PC Tech Magazine.

]]>
74340
My Cybersecurity Preview For 2024 https://pctechmag.com/2024/02/my-cybersecurity-preview-for-2024/ Mon, 05 Feb 2024 11:07:21 +0000 https://pctechmag.com/?p=74334 It’s about that time when everyone writes lists and predictions for the new year, and I’m excited to…

The post My Cybersecurity Preview For 2024 appeared first on PC Tech Magazine.

]]>
It’s about that time when everyone writes lists and predictions for the new year, and I’m excited to join the tradition and seize the opportunity to share my own insights! In my first post of 2024, let’s take a quick look around the digital scene, forecasting the cybersecurity trends and keeping an eye out for potential challenges and opportunities.

As we step into the new year, the cybersecurity landscape awaits with the dual facets of promise and peril in advancing technologies. From the rise of sophisticated cyber-attacks to the growing importance of AI in defense strategies, I navigate through the key landscapes that demand our attention.

  1. Generative AI in Phishing — The Art of Deception Unleashed

We talked a bit about phishing and social engineering last week. Going by the events of last year, we can expect to see attacks transcending traditional boundaries with unprecedented sophistication. Deepfakes and context-aware phishing are going to redefine the art of deception. Those phishing emails are going to get better, and much harder to detect even for the more conscious lot!

The good news is that artificial intelligence (AI) is also being used on the defense side. AI will help techies unmask the evolving tactics employed by cyber adversaries and explore advanced defense strategies. From AI-driven threat detection systems to user education on recognizing AI-generated scams, we shall see more of the arsenal against generative AI in phishing being deployed.

  1. Zero Trust Outside Networks — Extending Security Paradigms

As the cybersecurity landscape continues to witness sophisticated threats, the implementation of Zero Trust outside networks is anticipated to become a strategic imperative. Organizations will seek to fortify their defenses by scrutinizing every interaction, regardless of the external entity involved, fostering a resilient security posture in the face of evolving cyber risks. Expect discussions and initiatives centered around practical steps, challenges, and successes in implementing and adapting the Zero Trust model to diverse external environments.

Organizations will likely focus on adopting a holistic security approach that transcends conventional boundaries. The emphasis will be on building trust incrementally, validating the identity and security posture of entities outside the organizational perimeter. This extension of Zero Trust principles aims to address the dynamic nature of modern business interactions, including external collaborations, partnerships, and remote work scenarios.

  1. Cybersecurity Skills Gap — Initiatives for Bridging the Divide

In an age where cyber threats keep increasing in sophistication and reach, the scarcity of proficient cybersecurity experts presents a substantial risk. Ongoing research underlines the widening gap, with a persistent trend of unfilled cybersecurity positions persisting over the past two years. Recognizing this urgent need, proactive initiatives are set to emerge this year, marked by collaborative endeavors between industries and academic institutions, the implementation of certification programs, and the fostering of apprenticeships.

A notable initiative at the forefront of this movement is the “One Million Certified in Cybersecurity” program by ISC2 which aims to address the shortage by providing free, self-paced online training and exams to one million individuals. For those contemplating entry into the cybersecurity field and seeking a starting point, participating in this program offers a valuable opportunity to acquire foundational knowledge and embark on a meaningful cybersecurity journey.

Personally, I am exploring opportunities for collaboration with the local chapters of ISC2 and ISACA as certification bodies, and some private sector and public entities.

  1. Artificial Intelligence and Machine Learning on Both Sides of the Battle — Fortifying Defenses and Attacks

The ongoing battle between Artificial Intelligence (AI) and Machine Learning (ML) algorithms unfolds on both fronts, as these technologies fortify cybersecurity defenses while simultaneously empowering malicious actors. This year we shall see the latest advancements in AI-driven threat detection and the corresponding risks of AI-powered cyber attacks.

Organizations can leverage AI and ML defensively, from anomaly detection in network traffic to predictive analysis of potential vulnerabilities. It is imperative to delve into the intricacies of these measures, comprehending the countermeasures essential to thwart AI-driven threats effectively.

  1. UPDF Cyberdefense Programs — Safeguarding National Interests

In the wake of recent global conflicts, such as the war in Ukraine and events in Gaza, the significance of cyberwarfare has come to the forefront. Back home, little is known about Uganda’s People’s Defence Force (UPDF) capabilities in this domain. Is it a matter of their adept protection of secrecy, or is there a possibility that not enough is being done yet? They gladly show off fleets of fighter jets and tanks, but when it comes to cybersecurity, here’s what the Ministry of Defence website states “Our cybersecurity capabilities information cannot be made available here, but the country has seen, investigated and handled several high-profile cyber attacks in recent years”.

This year promises a deeper dive into understanding how our military employs cyber defense programs to safeguard Uganda’s national interests and critical infrastructure as the digital landscape becomes increasingly vital to national security.

As we push for more awareness and proactive strategy for individuals, SMEs, and large corporations, let us aspire to foster a collaborative exchange of knowledge that strengthens the collective cybersecurity posture for us all.

  1. 3rd Party and Vendor Security — Safeguarding the Value Chain

A quick look at some of the biggest cyberheists in Uganda, and you will see a common theme, or rather vulnerability: attacks through a compromised third party. It doesn’t matter how strong your defenses are if you let less secure services plug into your systems.

In the upcoming year, the focus on Third-Party and Vendor Security will intensify as organizations grapple with the persistent threat of cyber heists originating from compromised external entities.

Expect heightened scrutiny and proactive measures to safeguard the supply chain from cyber threats. Organizations are likely to invest more resources in rigorous vendor assessments, ensuring that third-party entities adhere to stringent cybersecurity standards. Collaborative efforts between organizations and their partners will likely evolve, emphasizing shared threat intelligence and collective strategies to fortify the entire supply chain against cyber threats. The goal will be to establish a resilient ecosystem where the security of one entity contributes to the overall strength of the interconnected network.

Also, we shall see some vendors who fail to make the mark be dropped by major players. The need for security will have the Telcos, banks, and other institutions suspend or even cut ties completely with third-party partners whom they deem high risk from historical events or audits of their current setups.

  1. IoT Security Challenges — Navigating the Interconnected Web

By this time, you probably are using not just one or two but several smart and connected devices, but you might tell me you don’t know what IoT is! That’s OK, you’re not alone, but it’s about time you brush up on your knowledge so that you don’t unknowingly introduce threats or vulnerabilities into your home or office.

In the forthcoming year, heightened awareness and proactive measures are expected to address the burgeoning IoT Security Challenges as the proliferation of interconnected devices becomes even more ubiquitous.

Moreover, the coming year is likely to witness increased efforts in developing and implementing robust security standards specifically tailored for the diverse range of IoT devices. From stringent authentication protocols to encryption measures, these standards will seek to establish a secure foundation for the interconnected web of devices, fostering a safer and more resilient IoT landscape.

As we conclude our expedition into the realms of cybersecurity, the tapestry woven is one of awareness, collaboration, and innovation; it is imperative to stay vigilant and proactive. By understanding the upcoming trends and challenges, we empower ourselves to build resilient defenses, ensuring a secure digital future.

The post My Cybersecurity Preview For 2024 appeared first on PC Tech Magazine.

]]>
74334
Data Privacy Day — Raise Awareness and Promote Privacy & Data Protection https://pctechmag.com/2024/01/data-privacy-day-promoting-privacy-and-data-protection/ Sun, 28 Jan 2024 07:42:41 +0000 https://pctechmag.com/?p=74337 On a public holiday, the allure of sleeping in a bit is undeniable, especially with the office closed.…

The post Data Privacy Day — Raise Awareness and Promote Privacy & Data Protection appeared first on PC Tech Magazine.

]]>
On a public holiday, the allure of sleeping in a bit is undeniable, especially with the office closed. But even if you run a business that still has to open or have work commitments, you probably don’t have to leave home as early as a typical work day.

I didn’t have such luxury presented to me this Friday morning, as I was up early to go through the usual early morning routine which doesn’t care about public holidays, ahead of a Digital Marketing and Social Media training facilitated by Patricia Kahill and Joy Akatukunda. These ladies know what they are doing and talking about; whenever you can, give them your money and let them teach you about Digital Marketing!

A few days prior, while passing by Arena Mall, my attention was drawn to a billboard proclaiming “Black Drip.” I wondered whether it was a new brand or I’d just been living under a rock or something. On Friday afternoon I discovered on Twitter that the Black Drip social media pages were abuzz earlier that day, showcasing extravagant purchases made by their clients.

It was all going well, the netizens were captivated; at least some of them. My friend Mark Ruhindi, a Tax and Corporate Lawyer wasn’t too impressed, he instead offered them free advice: DELETE, which they followed, but apparently, not fast enough as plenty of screenshots had already been taken. Uganda Revenue Authority (URA) also picked interest.

By the way, kudos to URA for adopting a tone that combines business acumen with a touch of humor on social media. It’s a refreshing approach that underscores the seriousness of their work while maintaining a connection with the public.

Black Drip is probably going to have extra scrutiny of their books from the Taxman, thanks to their viral post.

This incident serves as a stark reminder of the ramifications of oversharing, perfectly aligning with the ethos of #DataPrivacyDay, observed annually on January 28 to raise awareness and promote privacy and data protection best practices.

Our interconnected world provides a platform to share experiences, but it also demands a cautious approach, both for personal or business use.

As we commemorate Data Privacy Day, it’s crucial to reflect on our online habits. One fundamental step is to exercise caution in oversharing. In the era of constant connectivity, a momentary pause before posting personal details or locations can prevent unintended consequences. Additionally, take time to review and secure privacy settings on your online platforms. Limiting the visibility of personal details ensures that your online presence is shared only with your intended audience.

When many think of #Cybersecurity, images of hacking and technical intricacies come to mind. However, you go a long way toward safeguarding your data and privacy by simply being mindful of what you share online. Remember, the internet never forgets, as evidenced by URA’s timely reminder to Black Drip.

Happy Data Privacy Day!

The post Data Privacy Day — Raise Awareness and Promote Privacy & Data Protection appeared first on PC Tech Magazine.

]]>
74337
Empowering women-led businesses using IT: Q&A with Stella Nassali, Co-founder Zimba Women https://pctechmag.com/2016/09/empowering-women-led-businesses-using-it-qa-with-stella-nassali-co-founder-zimba-women/ Fri, 23 Sep 2016 08:07:54 +0000 http://pctechmag.com/?p=40216 Let us behind the curtain, tell us about yourself. The real you, not the Instagram filtered you! Okay,…

The post Empowering women-led businesses using IT: Q&A with Stella Nassali, Co-founder Zimba Women appeared first on PC Tech Magazine.

]]>
Let us behind the curtain, tell us about yourself. The real you, not the Instagram filtered you!

Okay, no filters; I am Stella Nassali Mudoola, a Project Manager by profession. I am a Co-founder Zimba Group Ltd and Owner of a branding company called X-ERA Limited… A Facebook and WhatsApp admin in countless groups, first born child, mother, wife…wait, why is this all on me? I suddenly feel overwhelmed!

One personal thing that I probably can’t find on the internet.

It is indeed personal but if you must know, I still believe I will make it to ‘The Voice’ stage some day and John Legend will be a judge. He will turn around with everyone else…at the end of my audition though.

How would you describe your career journey so far? Where did you start and how did you get here?

My career has been a wavering one. From working in a secretarial bureau during school holidays to my first formal employment as a Personal Assistant to Customer Service, Projects Assistant, Business Development Manager and here we are…an Entrepreneur!

How I got here was inevitable seeing as I always took charge of every situation and every environment in which I went. My attitude towards work was as good as that of the business owner. I like to move things and see them to completion while managing the limitations. After a while I realized that I could only have full control if I was at the top. I have since not hesitated to start up anything I put my mind to or join in on something that I believe has potential to work.

Stella Nassali
Stella Nassali Mudoola, Co-founder Zimba Women

Along the way, what are the highlights? Challenges?

I have learnt a lot through my career, met and interacted with people who have continued to shape my character. The diversity of the industries in which I have worked has taught me that I can do pretty much anything.

The challenges are quite frankly forgettable since they were dealt with almost instantly. The one that stands out though is the work-life balance.

What drives you? What’s your passion? What gets you out of bed every morning and keeps you awake late at night?

Strangely, it is ‘The Unknown’…way back when I led a routine life; it was obvious how the day was going to play out. Now while I have a plan for the following day/week/month, the possibility of new exciting things cropping up is quite high. I wake up looking forward to what the day has in store and then reflect on how it all worked out later in the night.

However now with the Zimba Women IT for Business Summit coming up in a few days, I am simply not sleeping. When I try, I dream of a monkey taking off with one of our LED screens #anxietyatzimba #zimbaTNS.

Tell us about the journey that led to the birth of Zimba Women.

Sherifah Tumusiime having left formal employment decided to start a business selling baby clothes. She was very optimistic and started big with a strategically located shop in the center of Kampala city. After a few months, she closed the shop because it was going to be a while before she could break even, if at all. In a bid to dispose of the stock, Sherifah advertised the items on a Facebook group ran by Peace Kuteesa and Stella Nassali and within 3 weeks, she had nothing left and her customers demanded for more.  The Baby Store, as it is called, blossomed online!

The Trio having seen how The Baby Store thrived among other businesses on the group decided to start a company that would promote online sales through not only Facebook but other online platforms as well. It was however realized that there was a lack of basic IT skills, poor business management and many informal businesses risking stagnation or possible closure. Elizabeth who runs a successful health based company online was brought on board and Zimba Women was born to address these issues.

Zimba Women now aims at providing access to entrepreneurship training, business development, mentorship, networking opportunities but most important of all, INFLUENCING MARKET ACCESS using Information Technology (IT). The power of IT cannot be avoided in business as it is today. The fact that it improves efficiency while helping one achieve more results than they would have without it. Zimba has established the socio-economic conscious business environment that includes full support of women entrepreneurs that will potentially bring millions out of poverty and help reduce the gender income gap.

How did you end up with the women you work with?

It was a matter of identifying diverse but relevant skills and characteristics. The core team thus comprises of:

Sherifah Tumusiime is a certificated IT professional and a YALI Fellow with a Degree in Computer Science. She is a fiery entrepreneur and independent thinker with proven abilities in web development, communications, and IT services. Sherifah is also CEO and founder of The Baby Store, the first specialty retail e-commerce website for baby products and apparel in Uganda.

Peace Kuteesa is a computer engineer with a Bachelor’s Degree in Computer Science. Also a certified IT systems and security professional, currently pursuing a Masters of Business Administration specializing in IT business management. Peace has 10 years of experience in security, encryption, internet safety.

Elizabeth Kasujja has an honors degree in the BSc. Industrial Chemistry from Makerere University and is currently pursuing an MBA-International Business which is helping Zimba position the company for the global market. She is certified as an entrepreneurship trainer by the International Labour Organization and also has a certificate in project management from APMG UK. She has worked with Alibeth Consults which deals with programs that promote youth empowerment and capacity building.

The brains behind Zimba Women. Photo Credit: Zimba Women
The brains behind Zimba Women. Photo Credit: Zimba Women

You have a Summit coming up next week. What should we expect?

The Zimba Women IT for Business Summit will be on the 28th and 29th of September 2016 at the Sheraton Hotel Kampala. Over 200 Business Women have been selected through an application process and the proceedings of the event will be broadcast live on the various social media platforms.

The theme this year is BREAKING BUSINESS BARRIERS and this is what the summit is aimed at. To address all issues that may arise at conception or during the business life. The Summit has an eventful program that will front a Business Women’s Executive Program, an Executive event on gender, a Business roadshow (by Facebook – “Boost your Business”), a mentorship program launch as well as highly interactive Question and Answer sessions.  Discussion panels will address issues to do with trade, finances, case studies and government’s involvement in the growth and development of small and medium enterprises in Uganda.

[related-posts]

Who are you working with to prepare this Summit? What role do they play? How are they a good fit for such an undertaking? 

Zimba Women is working with The US Embassy, Facebook, Seedstars World, UN International Trade Center, Smart Girls Uganda, Smart Telecom, PC Tech, Uganda Revenue Authority, Uganda Investment Authority, Uganda Communications Commission, Ministry of ICT, NITA Uganda, ICTAU, Smart Telecom, Uganda Registration Services Bureau, Trademark East, Uganda Export Promotions Board, National Chamber of Commerce and Industry, Mango Fund, to mention but a few.

The above have helped Zimba put the logistics for the event together as well as pledging to share a wealth of knowledge with the women and girls that will be present.

Where do you want to take this in the next say 10 years?

The plan is to have the Zimba Women IT for business Summit as an annual event, bringing together various women in business who should leave more empowered and ready to take their businesses to another level with the information they gather during these sessions. Zimba intends to follow up on attendees so as to ensure that the training information is used as expected.

The mentorship program for the students is meant to link students to Business Women who will mentor them. A follow up will be done to see that this is done effectively. That way the new generation will be aware and ready to take on IT for business.

Do you think the Government is doing enough to support women entrepreneurs?

Going by the responses Zimba Women has gotten from the government bodies approached, I would say that the government is more than willing to help. A lot of initiatives that support women entrepreneurs have come up through the government and more opportunities are in store.

What Zimba has realized is that the Women entrepreneurs need to come out and seek these opportunities through the right channels. Zimba having found these channels, will continue to bring the information forth to the potential beneficiaries so that the government support is realized.

How can successful individuals, at their individual levels contribute towards supporting a young women entrepreneur?

Successful individuals should be a source of information for young women entrepreneurs. They should offer this information willingly and readily. The Summit will feature some successful women who will share their own stories so that others may pick a leaf. Zimba welcomes anyone who would like to share information even after the summit; these will be incorporated in our mentorship program that sees women entrepreneurs continuously develop.

Last words: What do you have to say to encourage a woman that’s starting out in business, especially tech business?

For starters, they need to attend a Zimba entrepreneurship training ?

On a serious note though, I would encourage them to go into something they love doing. That way they will hold on to it through the highs and lows and eventually see it to the success it is headed for…not forgetting that ‘Your business is even better with Information Technology!’

On a lighter note: If you were to be stuck on Mijingo Island waiting to be rescued, what 3 things must you have with you?

A solar smartphone, a good Internet connection and Ffene

Oh, the rescuers had better get here before 28th September 2016 #ZimbaSummit16.

The post Empowering women-led businesses using IT: Q&A with Stella Nassali, Co-founder Zimba Women appeared first on PC Tech Magazine.

]]>
40216
6 differences between MoKash and traditional bank loans https://pctechmag.com/2016/09/6-differences-between-mokash-and-traditional-bank-loans/ Wed, 14 Sep 2016 08:02:32 +0000 http://pctechmag.com/?p=39878 A partnership between MTN Uganda and CBA recently brought to the Ugandan market the micro savings and loans…

The post 6 differences between MoKash and traditional bank loans appeared first on PC Tech Magazine.

]]>
A partnership between MTN Uganda and CBA recently brought to the Ugandan market the micro savings and loans product, MoKash. A week after the launch, CBA reported that over 80,000 mobile subscribers had signed up for the MoKash loans and savings product on mobile money in the first 48 hours. We don’t have latest figures but it’s expected that the growth continued on a high as more people got to know about the product.

If however you are one of those people who have not yet embraced the mobile loans idea, we’ve listed some differences between MoKash and regular bank loans to help you understand this better and how it could help you in your micro enterprise or in your personal finances.

Processing time
One of the biggest advantages that MoKash has over traditional loans is the instant loan processing. Whereas in a bank you have to fill in forms and wait days or even weeks to get an answer from the bank, with MoKash the moment you apply for the loan, you simply wait a couple of seconds to receive a notification that you have received the funds in your account.

This fast turnaround time means if you run into trouble and you need cash real quick, MoKash will sort you out instantly.

Repayment period
MoKash loans must be paid back in a period of 1 month, with an option to roll it over to the second month. This is a much shorter period than most bank loans which are usually a year or longer. This means that you use MoKash for short term needs.

For example, you might have had a slower week than usual, and your suppliers expect payment the next day and you are short. MoKash will give you the cash to pay off your suppliers and you can pay back MoKash during the course of the next weeks when business picks up again.

Vetting creditworthiness
If you’ve ever applied for a loan in the bank you might remember losing count of the number of forms you had to fill, and the number of times you signed. That is part of the process that the bank goes through to assess your creditworthiness. Now there are no forms to fill with MoKash, they use data they have on you, using artificial intelligence to assess you.

Some of the factors they use include how long you have been on MTN, your airtime and data usage patterns, your Mobile Money usage and others. Some documentation we’ve seen seems to suggest that MTN and CBA may also check with the Credit Reference Bureau for your borrowing reputation and it might also be factored in. That’s how your loan limit is arrived at.

Then once you start using MoKash, how you save, borrow and repay is also monitored and contributes to future assessment. So you need to save regularly, and to pay back promptly when you borrow.

Collateral
Yes, no collateral or security needed for a MoKash loan. Apart from salary loans, you must have collateral for nearly every other loan product in the traditional banking system. The provision of loans with no collateral means that many more people are able to get loans.

Loan amounts
If you have tried to get a MoKash loan, you already know your loan limit. The limit varies depending on your personal score, but is up to UGX 1m. Most people we’ve talked to complained that the limit was too low, but for an instant loan with no paperwork or collateral security, and for the intended purpose, I believe it’s good enough. The good thing is that when you build a solid record, your limit will be increased over time.

So MoKash amount limit means that you cannot borrow to build a house or buy a car, but it is sufficient for some cash shortfalls or if you’d like to restock your small business and pay back as customers purchase your goods.

Transaction costs
Another big advantage with MoKash is that there are no transaction costs for operating between your mobile money and MoKash savings account. With traditional banks and loans, you will be charged for several things when the loan is disbursed, sometimes up to 10% of the loan amount. So you can enjoy free transactions on MoKash and MTN Mobile Money.

If you still have more questions about MoKash you can read more of our articles about it or contact MTN Uganda or CBA directly.

The post 6 differences between MoKash and traditional bank loans appeared first on PC Tech Magazine.

]]>
39878
We can be a more productive workforce with faster and more affordable internet https://pctechmag.com/2016/09/we-can-be-a-more-productive-workforce-with-faster-and-more-affordable-internet/ Thu, 08 Sep 2016 12:30:59 +0000 http://pctechmag.com/?p=39516 I recently found myself in a position that I’ve not been in many times before. When I randomly…

The post We can be a more productive workforce with faster and more affordable internet appeared first on PC Tech Magazine.

]]>
I recently found myself in a position that I’ve not been in many times before. When I randomly checked the data balance on my MTN Mi-Fi router, I found out I had slightly over 1GB, which was due to expire the next day. That took me by surprise! I usually run down the bundles so fast that I never get to have data expiring on me. Even when I’ve used the “Unlimited” Vodafone and Smile packages, I’ve always hit the FUP cap quite easily.

I know what you’re thinking. How many ISPs do I use? MTN, Vodafone, Smile in one paragraph! That’s the hustle that one goes through in Uganda to find a package that is affordable, fast and has coverage in the places that you may find yourself in as you get about your business. The “Unlimited” offerings give you a good cost per GB, but because they are speed-capped, they cap your productivity as well. So that stops being funny real quick! You end up running down the bundle downloading videos and stuff, and not actually working.

Of course some people will be quick to argue that you can’t have both good quality and affordable in the same product, which is true in many cases. However when it comes to internet, I believe that we actually NEED high speed and affordable internet in Uganda, and Africa.

There has been a lot of hype about the next billion of internet users coming from Africa, and indeed with the lowest internet penetration at 28%, the highest population growth at 2.6% the opportunities are immense as all these currently offline people get online. But how is that going to happen when internet remains a luxury that many Africans can’t even afford to use regularly? And those who are able to get online often can only do the bare minimum that their data bundle will allow.

A quick look at statistics shows that the cost of internet is too high, with Africa’s regional average at $91, even higher than the average income of a Ugandan ($58).

Source: ITU Via MG Africa
Source: ITU Via MG Africa

I was fortunate to get online quite early in my life. I think some people would call me a “Dot Com Generation” child! I know some people who would never accept to be called such a thing, but I am better off because of my early encounters with the internet, so I’ll let it slide if you call me “Dot Com Generation”.

I used dial-up internet in my father’s office and then later in the computer lab at Ntare School. I’ve seen how we’ve progressed to today when we have mobile 4G internet. When your connection drops to 3G, you throw a tantrum! We’re quick to forget where we were not so long ago.

The internet has been my life, nearly everything I’ve done has been online, or facilitated by the internet. Even when I’m in a Church committee meeting, I’m thinking about how my Church can use the internet. When I’m in a Parents meeting at school, I think of how the school can help the internet. I’ve seen 1st hand the power of internet. So it’s personal when I talk about the cost of internet.

Simon Peter Otandeka, an IT consultant and developer behind HRMagic, an online Human Resource and Payroll Management System also works, earns and lives online.

“As a software developer I spend most of my time building systems that will be accessed by people across the globe via the Internet. I have been able to develop Software as a Service (SaaS) systems that my clients, many of whom I have never met, use and get my support in real time,” Mr Otandeka said.

These benefits have been passed on to non-technical people as well, so you can’t be quick to write the internet off just because you’re not a “techie” or “geek”.

Mr Otandeka’s Human Resource Management System code named “HRMagic” enables SMEs to automate their human resource and payroll functions and have access to them wherever they are.

Another benefit of the internet based system is that it saves companies money during their recruitment processes. Previously, jobs would be advertised in the newspapers, then applicants would trek to the office of the recruiting company and drop an envelope with their application letter and supporting documents, and once applications close, you shudder when you think about the amount of work that HR staff would have to do sorting through those applications! But today, all that process can be handled by a system, online. Applicants apply from wherever they are, no need to wear out their shoes delivering application letters. So the applicants are also saving time and money because of the internet.

Elizabeth Ahabwe, the Programs Manager at Women In Technology Uganda (WITU) has also benefited from using the internet in her work.

“Cheaper internet goes a long way towards cutting down administrative costs thus increasing disposable income and faster internet would help us get a lot more work done in a short amount of time,” Ms Ahabwe said.

“The internet has definitely made the way I work more convenient, from being able to access work files from anywhere on any machine, to being able to work together with colleagues at the same time even when not in same physical location. With the internet comes easy and more productive work days”, she went on to say.

At current costs, internet is usually the highest cost in the monthly budgets of many startups in Kampala. Imagine the relief that internet at a quarter of current costs would bring to the many young entrepreneurs trying to build things for the internet.

We are competing at a global scale with developers who access proper unlimited internet at a cost 10 times lower than ours, surely how can we price them competitively? How will Ugandans opt to use a Ugandan developed software when they can use an Indian alternative that is 5 times cheaper?

Mr Otandeka also agrees that faster and more affordable internet will reduce the cost of production for those whose work primarily depends on the internet, and also increase opportunities for them.

“The more people we have online locally, the bigger the pool of people who consume our services within our geographical location. This means more revenue for internet entrepreneurs, which will bring on more local players, and better service delivery through competition, said Mr Otandeka.

Again I must say I’ve been fortunate to either afford to be online, or to be in places where there is free or subsidized internet. I’m aware that many Ugandans haven’t had the opportunities that I have, and yet would benefit immensely from being online. They would be more productive and have access to information and resources that will enrich them at a personal level, and we’d collectively have a more empowered population.

For those who are already online, struggling to finish their work before the bundle runs out isn’t the way we should be living. Neither should we be online only during working hours because of the office wi-fi. One should be able to do research, download resources, and connect to other people without worrying about the high cost or the speed of internet. Surely, in 2016, we shouldn’t still have our Skype calls interrupted by “Hello… Can you hear me? Hello? … OK now I can hear you… Hello?”

As the struggle for lower internet costs goes on, you should take advantage of the current offers from ISPs. For example Smile Communications recently launched another “Unlimited” package which currently has the lowest cost per GB on the market, but at a monthly cost of UGX 330,000 (approx. $100), it is way out of reach for many. Oh, and the speed is capped!

MTN’s “Juzza” promo which gives you 100% bonus for every data bundle you buy is more available to an ordinary or average Ugandan internet user. In case you hadn’t figured it out, that, my friend, is how I ended up with more data than month.

But like Oliver Twist, I stand with my internet enabled device with the data bundle reloaded, saying to the Telcos, ISPs, the regulators, the government, we want some more internet!

The post We can be a more productive workforce with faster and more affordable internet appeared first on PC Tech Magazine.

]]>
39516
Uganda’s top online publishers form association https://pctechmag.com/2016/09/ugandas-top-online-publishers-form-association/ Mon, 05 Sep 2016 04:55:52 +0000 http://pctechmag.com/?p=39493 Over the last 10 years, print media has seen steady decline in both readership and revenue, and this…

The post Uganda’s top online publishers form association appeared first on PC Tech Magazine.

]]>
Over the last 10 years, print media has seen steady decline in both readership and revenue, and this year’s circulation or advertising spend reports are unlikely to reflect a change in the trend. Ugandans who used to rely on newspapers for their information and entertainment are quickly turning to the internet which meets their information needs with speed, ease and convenience that the print media can’t quite keep up with.

The leading online publishers who have, on the other hand, seen their audiences grow tremendously over the years have come together to form the Online Media Association – Uganda through which they plan to build capacity, improve quality, impact and value to both readers and advertisers.

The OMAU members led by the interim Chairman, Mr Giles Muhame, Founder of ChimpReports met the Minister of ICT, Hon Frank Tumwebaze on Thursday 1st September at the Ministry of ICT.

Hon Tumwebaze welcomed the formation of the Association and pledged his support, informing members that his ministry is already in the process of making some policy changes that will help interaction between the government and online publishers.

Online Media Association Uganda members with the Minster of ICT, Hon Frank Tumwebaze
Online Media Association Uganda members with the Minster of ICT, Hon Frank Tumwebaze

“We’re in the process of introducing a media buying policy which will give government departments and bodies guidelines on how to choose the best media for particular purposes. When online publishers are organized in an association, it makes it easier for us to hold members accountable to responsible reporting, and also give us as government bargaining power when we buy media,” Tumwebaze said.

“We are also considering outsourcing the entire media buying function to competent advertising firms”, he went on to say.

Mr Giles Muhame assured Hon Tumwebaze that the online publishers subscribe to the highest standards of reporting, which has won them both following and trust from their audiences.

Mr Muhame said, “The association will be self regulating and will have internal mechanisms to guide members on the best practices, build capacity and continuously improve skills for high quality news, information and entertainment.”

Presenting the OMAU profile to the minister, Mr Kyamutetera Muhereza, the founder of CEO Magazine said the 15 online media in the association have over 5 million visitors combined monthly and nearly 100 journalists who are influencers in their own right, commanding close to 500,000 followers on social media.

omau-kHe also urged the government to make changes that would increase government communication online to reach their people.

“Government needs to urgently look into a policy that requires government agencies to consider online channels for their communications across board- including statutory notices. Relaxing and or changing government PPDA – focused media buying protocols will also go a long way towards earning government better returns on investment,” Mr Kyamutetera said.

Mr Tumbwebaze also urged the OMAU members to always market Uganda online, saying, “When online, whenever you speak, you are speaking on behalf of Uganda, even if you didn’t intend to. So let us put aside our political differences and market Uganda collectively at all times.”

The OMAU has received generally warm reception from the public, and expectations are high as the association progresses through the legal processes to formalize their existence.

The post Uganda’s top online publishers form association appeared first on PC Tech Magazine.

]]>
39493
The social media blackout that can happen when you travel around Uganda https://pctechmag.com/2016/03/the-social-media-blackout-that-can-happen-when-you-travel-around-uganda/ Sat, 26 Mar 2016 05:30:37 +0000 http://pctechmag.com/?p=32850 In Uganda we like to travel to our upcountry homes for the holidays. The long Easter weekend provides…

The post The social media blackout that can happen when you travel around Uganda appeared first on PC Tech Magazine.

]]>
In Uganda we like to travel to our upcountry homes for the holidays. The long Easter weekend provides a perfect opportunity to do just that! We enjoy catching up with friends and family, and generally all the fuss that comes with taking a break from city life.

One thing you quickly realize as you settle in on your arrival at your country home is that you will clearly have to take a break from some amenities that you have become accustomed to! For example the President recently made an announcement on that as reported by Sheila Nduhukire on Twitter, so there is a high chance that your upcountry home is off the grid.

By the way, if you haven’t already gifted your family with a solar system, check out Fenix International’s ReadyPay Solar which you can even pay for in installments!

If you happen to be in an area on the grid or you’ve got alternative source of power like solar, congratulations! But that’s just half of the story if you are one of the social media junkies that form part of Uganda Communications Commissions’ internet users statistics. The next obstacle to your next Facebook fix is a working internet connection.

Many of the ISPs don’t have 4G connections beyond Kampala suburbs, those who do like MTN which has “countrywide coverage” and Smile Communications that has been on an expansion drive, will still focus on the major town centers as that’s what makes business sense. Now even with 3G much more available, if you are at your grand father’s home 20 km away from the sub county office, you might find your social interaction limited to the people in a 10m radius.

Uganda is gifted by nature, there's lots to see all around the country. However at many spots, internet connectivity is limited to EDGE/GPRS.
Uganda is gifted by nature, there’s lots to see all around the country. However at many spots, internet connectivity is limited to EDGE/GPRS.

Whereas at my parents’ house in Mbarara, I can get “4 bars” of 4G on MTN and get on with work (or “Facebooking”) as if I never left Kampala, my friend Diana who is at her mom’s house about 15 km from Kayunga isn’t as lucky. If you are the “glass half full” optimistic kinda guy, you could say Diana is lucky she can only get a limited 2G connection, and has no option but to interact with the people in the house. That was the purpose of travelling afterall, right?

Richard, a friend who has been living in Europe for the last 5 years returned to Uganda earlier this month, and has been traversing the country checking on folks. He spent the first few days in Kampala and I’d hooked him up with a 4G MiFi which gave him the impression Uganda had developed. The story was different however the moment he traveled West and about 1 hour into the journey realized he hadn’t got any notifications on his iPhone. He called and I walked him through the process to change the configuration from “4G only” to “Automatic” so that the device could be able to connect to 3G and 2G as they traveled. Over the next few weeks he was introduced to the reality that you can’t keep online reliably in many parts of our country.

Where are you for the Easter weekend? How are you faring? Are you online or are you going to read this on Tuesday when you return to the office? 😉

Happy Easter!

The post The social media blackout that can happen when you travel around Uganda appeared first on PC Tech Magazine.

]]>
32850
Airtel Uganda, Google confirm partnerships with 2016 CMS Africa Summit https://pctechmag.com/2016/03/airtel-uganda-google-confirm-partnerships-with-2016-cms-africa-summit/ Wed, 23 Mar 2016 06:31:32 +0000 http://pctechmag.com/?p=32712 We have just got confirmation that Airtel Uganda and Google will be part of the upcoming 2016 CMS…

The post Airtel Uganda, Google confirm partnerships with 2016 CMS Africa Summit appeared first on PC Tech Magazine.

]]>
We have just got confirmation that Airtel Uganda and Google will be part of the upcoming 2016 CMS Africa Summit that will take place 1st – 2nd April at GEMS Cambridge International School in Kampala. Whereas this is Airtel Uganda’s first time to get on board for the Summit, Google has been a partner for 3 years already.

As part of their partnership with “Africa’s premier web and mobile summit”, Airtel will provide a Fiber Optic internet connection that will be available to all delegates and will also provide 4 premium devices to the winners of the Hackathon.

Speaking about the partnership, Airtel Uganda’s Digital Manager, Charity Kamusiime said, “CMS Africa is a great platform for internet users in Uganda and we would like to offer them the fiber optic experience that we offer to our customers at Airtel”.

Mr Oduor Jagero, the CMS Africa Lead welcomed Airtel’s partnership saying, “Airtel is a strong regional telecommunications network and by partnering with CMS Africa Summit, it reinforces their commitment to development of ICT in Africa. We are glad to have them on board and I know that bringing a fiber optic experience will make the summit better for everyone.”

cms-africa2Commenting on Google’s partnership, Mr Oduor said, ”Google has been our partner for the last three years and their expertise and the quality of speakers they have always brought to the summit have been of great value to our delegates. Additionally, their financial support has helped us run the summit smoothly.”

Google will be sending in their Expert Eugene Mutai, a Software Engineer at Andela as part of their partnership, and he will speak on the topic “Progress Web Apps”. Progressive Web Apps use modern web capabilities to deliver an app-like user experience. They evolve from pages in browser tabs to immersive, top-level apps, maintaining the web’s low friction at every moment.

You know the saying “all work and no play…”, and the CMS Africa Summit has got you covered in that area, with a gaming booth for delegates, set up by Airtel Uganda. You can expect to catch up with all your online gaming tournaments and get back on top of the table![related-posts]

Airtel will also bring the “Yoola Amajja” money game where participants stand a chance to win up to UGX 2 million.

If you haven’t already, you can book yourself a slot at the Summit website. Expect to network with the best in the industry, both from the local scene and global players.

Julie Auma, Training Manager Huawei Device, Kenya had this to say about the summit, “CMS AFRICA SUMMIT offers a platform for ICT companies, financial companies, and many other organizations a chance to reinforce strategic relations and brand awareness amongst a relevant audience.”

Download the Summit app for Android for the full Summit Schedule and lots of other information.

The post Airtel Uganda, Google confirm partnerships with 2016 CMS Africa Summit appeared first on PC Tech Magazine.

]]>
32712