Sim Swapping

Subscriber Identity Module (SIM) swapping also referred to as, SIM jacking/SIM hijacking is a type of fraud in which criminals obtain a replacement SIM for a mobile number that does not belong to them, giving them access to the legitimate user’s information and accounts. Given that a SIM card holds sensitive information, when accessed by…

Read More

Privacy and Mobile Device Apps

How can you avoid malicious apps and limit the information apps collect about you? Before installing an app Avoid potentially harmful apps (PHAs): Limit your download sources to only trusted and known sources. Be savvy with your apps: Read and understand the permissions the app is requesting. On already installed apps Review app permissions: Ensure…

Read More

If You Connect It, Protect It

The line between our offline and online lives has become vague. This network of connections continues to create both challenges and opportunities for individuals and organizations globally. With regards to Cyber Security, it is vital to point out the ways in which internet-connected devices have impacted our lives and give measures to take in reducing…

Read More

Supply Chain Attacks

Supply chain attacks, also known as third-party attacks are data breaches or system compromises that occur through supply chain networks (integrated systems). This means that if a vendor is compromised in a cyber-attack the clients could also be breached and thus compromised. SolarWinds, a software company that primarily deals in system management tools used by…

Read More

Digital Service Tax

The development and increased use of digital technologies has facilitated business across national boundaries allowing consumers to access products and services from other countries. The Digital Services Tax (DST) Regulations took effect on 1 Jan 21, introducing levy on digital marketplace service providers. According to the Regulations, digital services include provision of downloadable content, subscription-based…

Read More

Data Privacy

Just after the passing of the New Year festivities, WhatsApp notified its billions of users worldwide, of a privacy policy change that will share WhatsApp data with Facebook. This news led to a mass shift of WhatsApp users to more privacy-focused applications like Telegram and Signal app. The mass movement is an indicator that many…

Read More

Google Loon Project Suspended

Google Alphabet Company confirmed it is shutting down the internet balloon business venture ‘Google Loon’. The project was aimed at improving internet access for communities in rural and remote areas. The project’s focus was to create a network of flying internet balloons as a cost-effective alternative of constructing cell tower infrastructure. Despite the perceived advantages…

Read More

Cyber Security Tips for Video Conferencing

During these unprecedented times, Companies in Kenya are turning to video conferencing to comply with social distancing to support ordinary business operations and comply with day-to-day activities.  Unfortunately, with this shift, there have been concerns over privacy and security whereby cybercriminals hijack the conference or use tactics to discover passwords to meetings. The following security…

Read More

Child Online Protection (COP)

Child online protection is an initiative developed by the International Telecommunication Union (ITU) to promote awareness of child safety in the online world to develop practical tools to assist governments, industry, and educators. The Kenya Constitution, Children’s Act No.8 of 2001 makes provision for parental responsibility, fostering, adoption, custody, maintenance, guardianship, care, and protection of…

Read More

Cloud Security

Cloud computing involves the delivery of computing services such as data storage, infrastructure, and software services, over the internet.   Some of the security risks that come with outsourcing a cloud service include: The data is exposed to threats such as hackers, bugs, social engineers, viruses, misconfiguration, malicious insiders, and natural disasters which could lead…

Read More