The National Cybersecurity Centre (NCC) detected over 3.8 million cyber threats in the first quarter of 2018-2019, indicating that Kenyans continue to be at a high risk of online attacks. According to a new report by the Communications Authority of Kenya (CA), the threats represented an increase of 11.76 per cent from the last quarter of the year where 3.4 million threats were detected. CA attributed the increased threats to enhanced cyber threat detection capabilities through deployment of additional sensors and increased resources towards cyber threat analysis “The cyber threats detected varied from denial-of-service (DoS) including botnet and brute-force attacks that led to denial of computer services and illegal access to computer systems; online impersonation
According to the Connected Worker survey carried out by Deloitte, 44% of workers cite issues with technology as a critical reason they waste 10 minutes in every hour, with over 80% stating they use their own personal digital technologies to compensate. "Our research has found that the majority of workers are both willing and able to use more technology at work," explains James Yearsley, lead services partner at Deloitte. "While employees are using personal devices to increase their productivity at work, they only gain the benefits if their employer links the devices to the company systems." There is little doubt that technology can have a transformative impact on a business. Fast and efficient access to information is vital. Communications can be revolutionised with th...
Nearly everyone would agree that 2018 was a far-from-boring year, and that applies to small and medium-sized business IT as well. Raymond Boggs, vice president of small and medium business research at IDC, notes that it was a surprising year in terms of cloud adoption for SMBs, particularly on two points. First, while cloud adoption is taking off with SMBs — a recent survey of SMBs from CDW found that 73 percent of respondents were using cloud in some capacity — there is still some hesitation among very small businesses. “The smallest of the small businesses, those with five to nine employees, are still slow when it comes to cloud adoption, which is curious because many of the issues around security and other concerns have been largely resolved. That was quite a surprise,”
Twitter is offering users another escape hatch from its ranked timeline. The company said today that it will introduce a prominent new toggle in the app to switch from the ranked timeline to the original, reverse-chronological feed. The company says the move comes in recognition of the fact that Twitter is often most useful in real time, particularly during live events such as sports games or the Oscars. Twitter began ranking the timeline almost four years ago. It was an effort to increase usage at a time when Facebook had pulled dramatically ahead of Twitter, raising doubts about the company’s future and setting it on a course to reinvent itself. Many users griped about the change, even though Twitter has always allowed users to switch back to the reverse-chronological feed
An estimated 6.8 million users were affected in the latest photo leak caused by a bug its app development platform that let apps access the private pictures of users, Facebook has revealed. Apps are expected to only have access to images posted on a user’s timeline, however a bug let the apps see any images linked to the account. This includes images on Facebook Stories and Facebook Marketplace, as well as those uploaded but not published. Facebook stores the latter for three days before they are deleted, in case the user decides to publish them. Users are required to give permission for apps to view photos, and only users who gave picture permissions had their images leaked to the apps. Facebook said the bug was active for 12 days between September 13th and September 25th,