NC3 leads the national effort to protect and enhance the resilience of the nation’s physical and cyber critical information infrastructure. This website provides cybersecurity resources guidelines, policies, and best practices for government agencies, SMEs, and other organizations.

Resoures

Cybersecurity and Law

Currently, Kenya has various pieces of legislation administered by different Government Departments and agencies. This legislation includes; The constitution of Kenya, 2010 Computer misuse and cybercrimes act (CMCA) 2018 Data protection act (DPA) 2019 Office of the attorney-general act 2012 Kenya information and communications act (KICA) 2013 The Kenya Defence forces act, 2012 National intelligence…

Read More

Attack Vectors

An attack vector is a method or pathway used by an attacker to illegally access and penetrate a target system or launch a cyber-attack. These pathways allow cyber criminals to exploit system vulnerabilities to gain access to sensitive data or other valuable information. An attack surface is the total network area an adversary can use…

Read More

Cybersecurity Framework

This cybersecurity framework presents a structured model that guides an organization on security best practices that they can implement concurrently to manage cybersecurity risks. The framework includes the following functions: Identify: Understand the organization’s context to better manage cybersecurity risks to systems, assets, data, and capabilities. This involves understanding the organization’s business context, the resources that support critical functions, and the related cybersecurity risks. Understanding…

Read More

Cybersecurity Steps

With the rise of cyber-attacks targeting organizations and industries, it has become vital that every organization protects itself in the cyberspace. The protection should defend against attacks targeting networks, applications, systems, and information. The following steps are vital in helping organizations protect themselves in the cyberspace. Risk Management It is best practice for organizations to…

Read More

Security of IoT devices

The continuous increase of the Internet of Things (IoT) dependence on both home and office use has provided an alternative attack surface for perpetrators who target misconfigured IoT devices as well as devices with weak passwords. Cyber threat actors are using malware to compromise IoT devices and add them to botnets. Botnets are a network…

Read More

Child Online Protection (COP)

Child online protection is an initiative developed by the International Telecommunication Union (ITU) to promote awareness of child safety in the online world to develop practical tools to assist governments, industry, and educators. The Kenya Constitution, Children’s Act No.8 of 2001 makes provision for parental responsibility, fostering, adoption, custody, maintenance, guardianship, care, and protection of…

Read More

Cloud Security

Cloud computing involves the delivery of computing services, such as data storage, infrastructure, and software services, over the internet. Some of the security risks that come with outsourcing a cloud service include: The data is exposed to threats such as hackers, bugs, social engineers, viruses, misconfiguration, malicious insiders, and natural disasters which could lead to…

Read More

Cyber Security Tips for Video Conferencing

During these unprecedented times, Companies in Kenya are turning to video conferencing to comply with social distancing to support ordinary business operations and comply with day-to-day activities.  Unfortunately, with this shift, there have been concerns over privacy and security whereby cybercriminals hijack the conference or use tactics to discover passwords to meetings. The following security…

Read More

Wi-Fi Network Security Measures

Wi-Fi is a wireless networking technology that allows devices such as computers, mobile devices, and IoT devices to interface with the Internet to exchange information with one another, creating a network. Internet router is the gateway to Internet access and is prone to exploits by cybercriminals who can sneak into our devices and get access…

Read More