Tag: cyber security

Kenya: CCK Secures Cyberspace for Progressive Development

Cyber Security
The combination of telecommunication and information systems has come into one product, ICTs that dictates the direction of our lives. At this point in time, Kenya considers ICT as a bubble because the Jubilee government has adopted it as one of the engines of economic development. If this has to facilitate the government idea to see that ICT trickles down to all Kenyans and who use them in what has previously been referred to as a knowledge economy, then regulators for instance, the Communication Commission of Kenya (CCK) and information disseminators have a responsibility of drawing synergies from each other in order to coherence and provide the right direction for this services to be utilized by Kenyans. more

Cybersecurity for Small Business

Business, Cyber Security
The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a business is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence. In October 2012, the FCC re-launched the Small Biz Cyber Planner 2.0, an online resource to help small businesses create customized cybersecurity plans. The FCC also released an updated one-page Cybersecurity Tip Sheet. The q...

Cybersecurity for Small Business

Business, Cyber Security
The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a business is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence. In October 2012, the FCC re-launched the Small Biz Cyber Planner 2.0, an online resource to help small businesses create customized cybersecurity plans. The FCC also released an updated one-page Cybersecurity Tip Sheet. The qui...

How cyber-criminals are planning to attack in 2013

Cyber Security
CAPE TOWN - Software vulnerabilities will be the main target of cyber-criminals next year. This is according to a list, compiled by PandaLabs, Panda Security’s malware laboratory, of the security trends that will predominate in 2013. According to Jeremy Matthews, Panda Security’ country manager, “It is undoubtedly the preferred method of infection for compromising systems transparently, used by both cyber-criminals and intelligence agencies in countries around the world. more