In today's hyper-connected world, cybersecurity is no longer a concern limited to tech companies and government agencies. As the digital landscape evolves, every individual and organization, regardless of size or industry, faces growing threats from cybercriminals. Understanding the current cybersecurity environment is crucial to protect sensitive data and maintain trust in digital interactions.
The Kenyan government has allocated Ksh.16.3 billion to support initiatives in the Information, Communication and Technology (ICT) sector in the 2024/2025 Budget.
This was revealed by Kenya’s National Treasury CS Njuguna Ndung’u while reading the Budget in Parliament on Thursday.
To enhance the state of cyber security in Kenya, companies like Estream East Africa Limited are taking proactive measures to mitigate risks and protect their data. Estream East Africa Limited is a lea
ding technology company in Kenya that offers cybersecurity solutions to businesses to help them combat cyber threats and secure their digital assets......
Google has announced plans to collaborate with Kenya’s Ministry of Information Communications and The Digital Economy to strengthen the country’s cybersecurity efforts
Cybersecurity threats are a growing concern in today's digital age. As businesses and individuals become more reliant on technology, the potential risks and attacks have also increased. Being aware of the most common cybersecurity threats is the first step in protecting yourself and your organization. In this blog, we'll explore some of the most prevalent cyber threats and how you can defend against them.
1. Keep software up-to-date
Software companies typically provide software updates for 3 reasons: to add new features, fix known bugs, and upgrade security.
Always update to the latest version of your software to protect yourself from new or existing security vulnerabilities.
2. Avoid opening suspicious emails
If an email looks suspicious, don’t open it because it might be a phishing scam.
Someone might be impersonating another individual or company to gain access to your personal information.....
The Strategy is based on the following pillars:
1. Cybersecurity governance;
2. Cybersecurity policies, laws, regulations and standards;
3. Critical Information Infrastructures Protection (CIIP);
4. Cybersecurity capability and capacity building;
5. Cyber-Risks & Cybercrimes Management; and
6. Cooperation and collaboration.
Microsoft, through its Africa Development Centre (ADC) in Kenya, has announced plans to train 100 students in cybersecurity across Kenya.
The training will be done in partnership with Cyber Shujaa, a youth-focused program delivered by a consortium of 3 partner organizations: Serianu Limited, United States International University-Africa (USIU-Africa) and Kenya Bankers Association (KBA).
According to the recent Kaspersky study, more than 40% of companies worldwide are facing a shortfall of qualified cybersecurity professionals. Most understaffing can be found among Malware analysts and Information security researchers.
This problem is even more sensitive for the META region, with 43% of companies recorded as understaffed.
The World Economic Forum and ISC2 also say the world urgently needs 4 million cybersecurity experts.
Back to Top













