Cyber Security

Cisco: Cybersecurity should be a foundational component of digital strategies

Cisco: Cybersecurity should be a foundational component of digital strategies

Cyber Security
It is time for a new approach to security. Today’s dynamic threat landscape demands a security strategy that focuses on the threat itself more than simply prevention. One that doesn’t continue to simply stick band-aid over band-aid, until a cat’s cradle of fixes and patches becomes a management nightmare. Meanwhile, the organisation’s systems remain vulnerable to new, increasingly smart, attacks. Findings from the recent The Cisco 2018 Security Capabilities Benchmark Study reveal that more than nine out of ten (94%) companies surveyed in the Middle East and Africa have suffered a breach in the last year, with nearly a half (48%) experiencing more than $500,000 (around R6.2 million) in damage. The good news is that companies in the region are taking a progressive approach to tackling
Computer and Cybercrimes Bill Enacted into Law in Kenya as media and rights groups oppose move

Computer and Cybercrimes Bill Enacted into Law in Kenya as media and rights groups oppose move

Cyber Security, Governance
President Uhuru Kenyatta enacted Computer and Cybercrimes Bill, 2017 citing a two year jail term or Kshs 5 million fine for spreading fake news. The President’s decision is facing protests with many Kenyans claiming it is a move to suppress not only media freedom but citizens’ freedom of speech. The new law also provided for offences relating to computer systems, cyber espionage, false publications, child pornography, computer forgery, computer fraud, cyber stalking and cyber bullying, aiding or abetting in the commission of an offence. Offences relating to computer systems, a fine not exceeding five million shillings or to imprisonment for a term not exceeding three years, or to both. Cybersecurity cost Kenya over Sh21.2 billion in 2017 coming a close second to Nigeria tha
Protecting Privacy and Personal Data in Africa

Protecting Privacy and Personal Data in Africa

Cyber Security
At the Africa Internet Summit in Dakar, Senegal, the Internet Society and the African Union Commission unveiled a new set of Guidelines that highlight how privacy protection and the responsible use of personal data are critical factors in building greater trust online and in advancing the digital economy in Africa. The Personal Data Protection Guidelines for Africa launched today were jointly developed by the Internet Society, a global non-profit organization that promotes the open development, evolution and use of the Internet, and the African Union Commission to facilitate the implementation of the AU’s Convention on Cyber Security and Data Protection (known as the Malabo Convention), adopted in 2014. The Guidelines recommend a range of actions for governments, policy makers, c
High cost of cybercrime in Africa cause for concern

High cost of cybercrime in Africa cause for concern

Cyber Security
African businesses need to take more decisive steps to prioritise data protection and enhance enterprise security in order to mitigate the high cost of cyberattacks. Ken Munyi, Country Manager at iWayAfrica Kenya says the millions of cyberattacks that take place every year across the continent are cause for concern, particularly for Africa’s larger economies such as South Africa and Nigeria, as well as Kenya which was ranked as the 69th most vulnerable country in the Global Threat Index out of 127 nations, last year. “Guaranteeing data protection is vitally important for minimising financial loss while also complying with regulatory requirements and meeting customer expectations. Organisations need to take a proactive approach to enterprise security and view it as a strategic inves
Quick tips to secure yourself against Cyber Threats

Quick tips to secure yourself against Cyber Threats

Cyber Security
There are many different ways to reduce cyber threats. First of all, computer security patches are continually released for operating systems that are widely used in the business world. Therefore, make sure your systems have all been updated with the latest security patches. Prioritize Remember, trying to protect all your assets against all possible risks equally is never profitable. Therefore, you need to prioritize which assets are the most valuable and which threats are the most dangerous. Our devices, our cars, our homes, our phones, our workplaces and even our clothes are connected to bring the world closer, but this also opens a Pandora’s box of cyber threats associated with this connectedness. Predict While the heart of the subject remains in the evangelization of users to m