SIM Swapping

It is a type of fraud in which criminals obtain a replacement SIM for a mobile number that does not belong to them, giving them access to the legitimate user’s information and accounts.

Read More

Digital Service Tax

The development and increased use of digital technologies has facilitated business across national boundaries, allowing consumers to access products and services from other countries. The Digital Services Tax (DST) Regulations took effect on 1 Jan 21, introducing a levy on digital marketplace service providers. According to the Regulations, digital services include the provision of downloadable…

Read More

Supply Chain Attacks

Supply chain attacks, also known as third-party attacks, are data breaches or system compromises that occur through supply chain networks (integrated systems). This means that if a vendor is compromised in a cyber-attack, the clients could also be breached and thus compromised. Solar Winds, a software company that primarily deals in system management tools used…

Read More

Privacy and Mobile Device Apps

How can you avoid malicious apps and limit the information apps collect about you? Before installing an app Avoid potentially harmful apps (PHAs): Limit your download sources to only trusted and known sources. Be savvy with your apps: Read and understand the permissions the app is requesting. On already installed apps Review app permissions: Ensure…

Read More

Online Shopping

The holiday season is a prime time for hackers, scammers, and online thieves. Due to the pandemic, the holiday season may look and feel a bit different, but we all still need to be aware of the potential dangers online shopping can bring and the ways we can protect ourselves. While Kenyans will be online…

Read More