Being online exposes us to cybercriminals and others who commit identity theft, fraud, and harassment. Every time we connect to the Internet—at home, at school, at work, or on our mobile devices—we make decisions that affect our cybersecurity. Emerging cyber threats require engagement from the entire Kenyan community to create a safer cyber environment—from government and law enforcement to the private sector and, most importantly, members of the public.
The holiday season is a prime time for hackers, scammers, and online thieves. Due to the pandemic, this holiday season may look and feel a bit different, but we all still need to be aware of the potential dangers online shopping can bring and the ways we can protect ourselves. While Kenyans will be online…Read More
The cybersecurity threat landscape continues to expand. Attackers leverage various tactics and techniques to target both the public and private sector institutions. Attackers use common attack vectors and known vulnerabilities to compromise the security of organizations. NC3 offers advisory and guidance on how to protect organizations from cyber-attacks. NC3 also offers policies, procedures, and guidelines…Read More
Kenya has a well-established military protecting the three major domains of warfare including land, air and sea. However, the emergence of the cyberspace as a new domain of National Security has necessitated an authority and a focal point of contact who will coordinate the efforts of all stakeholders involved in the governance of Kenya’s cyberspace.…Read More
1. Risk Management A risk management should be set up which mainly consists of applicable policies, guidelines and practices that must be established, streamlined and should effectively be communicated to all the employees, contractors, and suppliers to assure that everyone is aware of the approach, e.g., how decisions are made, about risk boundaries, etc. 2.…Read More