Blog Tags

Thanks for reading! Share your thoughts below.

Insider Threat: Your Biggest Security Risk Logged in This Morning

Insider Threat: Your Biggest Security Risk Logged in This Morning

<p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">You might be looking outside yet the employee in the next office can cause your biggest lose. </span></span></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">In January 2024, an incident attributed to &ldquo;human error&rdquo; was …

Read More

Is your Visibility Failing you? Where You are getting it Wrong on Cyber Security Visibility

Is your Visibility Failing you? Where You are getting it Wrong on Cyber Security Visibility

<p style="text-align:justify"><strong><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></span></span></strong></p> <p style="text-align:justify"><span dir="ltr" lang="EN-US"><span style="font-family:Georgia,serif; font-size:12pt">Imagine an accident happens on your way to work. You&#39;re sitting there frustrated, trying to figure out who&#39;s at fault. It&#39;s even harder for the traffic officer when both drivers refuse to agree on basic traffic rules.</span></span></p> …

Read More

Why Strong Passwords Still Matter (And How to Get Them Right)

Why Strong Passwords Still Matter (And How to Get Them Right)

<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></strong><br /> <span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Since their introduction at MIT by Professor Fernando Corbat&oacute;&#39;s team in 1961, digital passwords have become a cornerstone of digital security. Even today, with numerous other methods available, over 90% of users still rely on them. They remain …

Read More

Kenya’s Cybersecurity Landscape Q2 2025-2026: Rising Threats & Strengthened Defences

Kenya’s Cybersecurity Landscape Q2 2025-2026: Rising Threats & Strengthened Defences

<p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">The latest quarterly report from Kenya&rsquo;s National KE-CIRT/CC reveals a sharp escalation in cyber threats, alongside growing national efforts to build resilience through training, partnerships, and proactive advisories.</span></span></span></span></p> <p style="text-align:justify"><strong><span style="font-size:12pt"><span style="font-family:Georgia,serif">Key Findings: A Surge …

Read More

Protecting Kenya's Digital Future: A Snapshot of the National KE-CIRT/CC's Q1 2025-2026 Cybersecurity Report

Protecting Kenya's Digital Future: A Snapshot of the National KE-CIRT/CC's Q1 2025-2026 Cybersecurity Report

<p style="margin-left:9px; text-align:left"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:12.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong>&nbsp;&nbsp;&nbsp;&nbsp;</span></span></p> <p style="text-align:justify"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;"><span style="font-size:12.0000pt"><span style="font-family:Georgia">As Kenya&#39;s digital ecosystem expands, so does the sophistication of threats aiming to undermine it. The National Kenya Computer Incident Response Team - Coordination Centre (National KE-CIRT/CC), housed within the Communications Authority of Kenya, stands as …

Read More

Enhancing Email Security in the Workplace: Why Every Email Matters

Enhancing Email Security in the Workplace: Why Every Email Matters

<p style="text-align:center">&nbsp;</p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:13.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri"><span style="font-size:12.0000pt"><span style="font-family:Georgia">Every working day at your workplace begins and ends with email. From internal memos and departmental updates to supplier communication and patient-related coordination, email remains one of the most relied tools in our daily operations and because …

Read More

Firewall Under Siege: Securing Your First Line of Digital Defense in 2026

Firewall Under Siege: Securing Your First Line of Digital Defense in 2026

<p style="text-align:justify"><span style="font-size:16px"><span style="background-color:#ffffff"><strong><span style="font-family:Georgia"><span style="color:#0f1115"><strong>Introduction</strong></span></span></strong></span></span></p> <p style="text-align:justify"><span style="background-color:#ffffff"><span style="font-size:12.0000pt"><span style="font-family:Georgia"><span style="color:#0f1115">In the fast-moving digital economy of East Africa, a silent but critical battle is intensifying at the network&#39;s perimeter. The firewall&mdash;long considered the steadfast guardian at the gate&mdash;is now a primary target for sophisticated cyberattacks. As we enter 2026, …

Read More

5G Expansion: Unlocking Innovation, Unleashing New Cybersecurity Challenges

5G Expansion: Unlocking Innovation, Unleashing New Cybersecurity Challenges

5G is revolutionizing connectivity and rewriting the rules of cybersecurity.

Read More

The Silent Cyber Threat Targeting Kenyan Phones: Smishing on the Rise

The Silent Cyber Threat Targeting Kenyan Phones: Smishing on the Rise

Smishing scams are exploding across Kenya fake M-PESA refunds, KRA alerts, and delivery texts are stealing millions. Don’t click blindly; protect your business and staff today.

Read More

Shadow AI: The Hidden Cybersecurity Risk Lurking in Your Workplace

Shadow AI: The Hidden Cybersecurity Risk Lurking in Your Workplace

Shadow AI is already in your workplace unapproved tools quietly leaking data and breaking compliance. Govern, monitor, and secure AI use before it governs you.

Read More
← Back to All Blogs