In the 21st century the cyberspace in Kenya has
grown massive and by now over 70% of Nairobi residence are connected to the
internet on a daily basis. Keeping in mind that the rest of the country is also
connected and the numbers keep growing.
With this in mind the government and other agencies are now adopting
these technologies and are providing their services online and though mobile
platform.
With this in mind we are exposed to a dozen of
vulnerabilities and malware attacks from all range of devices including and not
limited to phones, tablets, pcs, and servers. Hackers take advantage of these
and cause damage to the systems and devices which end up paralyzing operations.
With Kenya being a hub of technology we not only boast we of
innovation and paving way for other African nations, but we also become a target
for all kinds of cyber attracts ranging from database corruption, information and identity theft,
DOS, man in the middle attacks, malware injections and many more.
In the past years we as a country have suffered and been shamed
after facing attacks of different kinds. Some of these include:
- Kenya Revenue attack summing up to 4billion loss
- Post bank website brought down under ramsonware
- National Environment Management Authority website brought down for hours
- Communication authority website as well
- Twitter accounts hacks of government officials
With all of these behind our backs we did not just sit down
and tweak your fingers hoping that all will be well. Polices and rules that
govern the cyber space have been set it’s an ongoing process to clean up the space and bring perpetrators to book. Some of this laws and acts include:
- African union convention on cyberspace
- Personal data protection act
- Cybercrime and computer related crimes bill
- Cyber security and protection bill 2016
- National computer incidence response team coordination center
- International telecommunication union
This are just but a few of the laws and response action that
are set-in place to govern and moderate the cyber space.
Well some might ask how all of this affect them and they are
not IT experts or students. A lot of crime may happen to people who might not
even have a clue to what IT stands for.
For instance let’s have a look at cyber stacking. This is
the scenario that victims are followed online and leads to physical tracking
whereby the attacker may cause mental harm by sending disturbing messages to
its victim and worse case when the attacker carries out physical harm to its
victim like rape, killing and so forth.
With all this in mind government agencies and other organizations
need to invest on white hats so as to combat such scenarios before they do
happen as you cannot deploy a system and assume you will be safe for ever.
If a black hat is able to access a company’s database and
either distribute or corrupt the information these means massive loss of
revenue and client trust. If Trade secrets or financial records are leaked
these may bring a company to its knees.
As a cyber-security expert I would like to encourage companies to review
its IT polices, server administration
polices, firewall rules...…(for more contact me at a fee.) as these would strengthen
their infrastructure and decrease the rate attacks