Vulnerability is a weakness that can be exploited by a cyber attack to gain unauthorized access to systems, or perform unauthorized actions on a computer system. Vulnerabilities can allow attackers to run code, access a system’s memory, install malware, and steal, destroy or modify sensitive data.
The holiday season is a prime time for hackers, scammers, and online thieves. Due to the pandemic, this holiday season may look and feel a bit different, but we all still need to be aware of the potential dangers online shopping can bring and the ways we can protect ourselves. While Kenyans will be online…Read More
The cybersecurity threat landscape continues to expand. Attackers leverage various tactics and techniques to target both the public and private sector institutions. Attackers use common attack vectors and known vulnerabilities to compromise the security of organizations. NC3 offers advisory and guidance on how to protect organizations from cyber-attacks. NC3 also offers policies, procedures, and guidelines…Read More
Kenya has a well-established military protecting the three major domains of warfare including land, air and sea. However, the emergence of the cyberspace as a new domain of National Security has necessitated an authority and a focal point of contact who will coordinate the efforts of all stakeholders involved in the governance of Kenya’s cyberspace.…Read More
1. Risk Management A risk management should be set up which mainly consists of applicable policies, guidelines and practices that must be established, streamlined and should effectively be communicated to all the employees, contractors, and suppliers to assure that everyone is aware of the approach, e.g., how decisions are made, about risk boundaries, etc. 2.…Read More