ESET East Africa Blog ESET East Africa Blog
ESET East Africa Blog ESET East Africa
ESET East Africa Blog ESET East Africa Blog
  • Cyber Security
    • Cyber Security
      • Man working on computer at home
        Forecasting Work from Home Cyber Threats in Our New Normal
      • wi-fi router
        11 Hacks for boosting your Internet Speed Connection while WFH
      • Coronavirus Themed Scams and Lies You Should Know
      • Man working from home
        How to Secure Your RDP and Remote Access
      • Woman working at home on laptop
        Secure Videoconferencing: The Basics
    • Cyber Crime
      • Man working on laptop
        Coronavirus con artists continue to thrive
      • cybersecurity challenges enterprise
        Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise
      • Approximately US $150,000 worth of Ethereum-based cryptocurrency stolen
      • Meltdown and Spectre
      • Phishing email
        Black Friday Cyber Monday – Stop … Look … Think!
    • Ransomware
      • Man working on computer at home
        Forecasting Work from Home Cyber Threats in Our New Normal
      • Ransomware
        Ransomware Protection Crucial to Enterprise
      • cybersecurity challenges enterprise
        Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise
      • Approximately US $150,000 worth of Ethereum-based cryptocurrency stolen
      • Security trends to look out for in 2018
  • Research
    • Research Posts
      • cybersecurity challenges enterprise
        Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise
      • ESET research team assists FBI in Windigo case
      • ESET solution praised for low system impact by AV-Comparatives
      • Win32-Industroyer
        Win32/Industroyer: A new threat for industrial control systems
      • ESET Trends 2017 in Android Ransomware
        ESET Trends 2017 in Android Ransomware
      • ESET Trends 2017 – Security Held Ransom
        ESET Trends 2017 – Security Held Ransom
  • Technology
    • Android
      • Securing multiple operating systems on a single network? It is manageable
      • Fake Security App
        Beware: ad slingers thinly disguised as security apps
      • Malware alert for Android
        Malware alert for Android phone users
      • Ransomware Android Phone
        Ransomware: Cause for Alarm for Android Phone Users
      • New parental control app
        New parental control app monitors children’s online activities
    • Linux
      • Securing multiple operating systems on a single network? It is manageable
      • ESET research team assists FBI in Windigo case
      • Serious Linux vulnerabilities
        The importance of patch management after serious Linux vulnerabilities
    • Windows
      • Securing multiple operating systems on a single network? It is manageable
      • ESET Chrome Cleanup
        ESET and Google combine to improve Chrome
      • Understanding Wannacryptor
        WannaCryptor: What you need to know about the ransomware
  • Video
    • Video Posts
      • VideoCyber Crime Prevention
        What you need to know for Cyber Crime Prevention
      • Alistair Freeman Interview On EBRU TV
        Alistair Freeman Interview On EBRU TV
      • How to make a strong password
        How to make a strong password
      • Poor cybersecurity costs Kenyan companies billions in losses yearly
        Poor cybersecurity costs Kenyan companies billions in losses yearly
      • What is encryption
        What is encryption and how does it work?
      • What is cyberbullying
        What is cyberbullying and how to defend against it?
  • Opinion
    • Opinion Posts
      • Why Parents need to defend their homes against the deep waters of the Internet
      • Ransomware ESET East Africa
        Ransomware the next big threat to data
  • Featured
    • Featured Posts
      • Convergence Partners acquires Stake in ESET East Africa
      • ESET solution praised for low system impact by AV-Comparatives
      • ESET receives Bronze Award in the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
      • Teddy-Njoroge-ESET-Country-Manager-Kenya
        Teddy Njoroge on building the brand and revenues for ESET in East Africa
      • Free online cybersecurity training
        Free online cybersecurity training for businesses in Kenya
      • cybersecurity breach reporting
        Calls for standardized cybersecurity breach reporting
  • ESET Main Website
  • ESET Store
  • Virus Radar
  • About ESET
  • Contacts

Latest Stories

Man working on computer at home

Forecasting Work from Home Cyber Threats in Our New Normal

wi-fi router

11 Hacks for boosting your Internet Speed Connection while WFH

Coronavirus Themed Scams and Lies You Should Know

Social Connect

Man working on computer at home

Forecasting Work from Home Cyber Threats in Our New Normal

ESET Partner Programme

Five Things About the ESET Partner Programme You May Not Have Known

wi-fi router
COVID-19, Cyber Security, Malware, Security Tips, Technology

11 Hacks for boosting your Internet Speed Connection while WFH

COVID-19, Cyber Security, Email

Coronavirus Themed Scams and Lies You Should Know

Man working from home
COVID-19, Cyber Security, Privacy, Security Tips

How to Secure Your RDP and Remote Access

ESET Africa Blog

Secure Videoconferencing: The Basics

Woman working at home on laptop

Coronavirus con artists continue to thrive

Man working on laptop

How To Easily Set Up a VPN at Home

Woman working at home

How To Improve Communication Security with MFA

Person working on two factor authentication

Latest News and Articles

Types of Scams

3 Ways Scammers Are exploiting Coronavirus Fears

Man working on computer at home
COVID-19, Cyber Security

5 Surefire Ways To Create a Cybersecure Home Office Experience 0 1163

Cyber Security, Enterprise, Security Tips

Cyber-attack risks for companies with employee origins 0 914

Security Tips, Technology

Network security solutions’ value proposition to be found in improved insights 0 892

Cyber Security, Security Tips

Shortage of IT security specialists? Outsourcing security services may be an option 0 791

Android, Antivirus, Cyber Security, Linux, Mac, Windows

Securing multiple operating systems on a single network? It is manageable 0 1034

Targeted Attacks
Cyber Security, DDoS, Hacking

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business 0 915

Most Popular Right Now

1
ESET Partner Programme

Five Things About the ESET Partner Programme You May Not Have Known 6159

2
digital-infrastructure-survives-2017-kenyan-elections

Ensure your business’ digital infrastructure survives the 2017 Kenyan elections 3026

3
What is cyberbullying

What is cyberbullying and how to defend against it? 2989

4
Kenya cybercriminal activity

The role of Kenyan Legal Professionals in Cybersecurity 2687

5
ESET Chrome Cleanup

ESET and Google combine to improve Chrome 2621

ESET Africa Blog
Demo image

Browse By Topic

ESET East Africa Blog
Cyber Security
ESET East Africa Blog
Cyber Crime
ESET East Africa Blog
Ransomware
ESET East Africa Blog
Antivirus

Choose Topic

  • All Articles
  • Cyber Security
  • Cyber Bullying
  • Ransomware
  • Hacking
  • DDoS
  • Security Tips
  • Partner Programme

Most Discussed

1

3 Ways Scammers Are exploiting Coronavirus Fears 1

2

New parental control app monitors children’s online activities 0

3

USB drives with built in antivirus launched 0

Popular

ESET Partner Programme

Five Things About the ESET Partner Programme You May Not Have Known

digital-infrastructure-survives-2017-kenyan-elections

Ensure your business’ digital infrastructure survives the 2017 Kenyan elections

What is cyberbullying

What is cyberbullying and how to defend against it?

Partner with ESET

ESET Africa Blog
ESET Kenya Blog
  • CONTACT
  • PRIVACY
  • LEGAL INFORMATION
  • REPORT VULNERABILITIES

© 1992 - 2017 ESET, spol. s r.o. - All rights reserved. Trademarks used therein are trademarks or registered trademarks of ESET, spol. s r.o. or ESET North America. All other names and brands are registered trademarks of their respective companies.

Menu
  • ESET East Africa Blog
  • Catagories
    • Cyber Security
      • Cyber Bullying
      • Privacy
      • DDoS
      • Malware
      • Cyber Crime
    • Research
      • White Papers
    • Technology
    • Video
  • About Us
  • Contacts
Contact Info
Unit 2, The Mirage, Chiromo Road, Westlands, Nairobi
+254 207 607 004
sales@esetafrica.com

Most Popular Topics

ESET East Africa Blog
Cyber Security
ESET East Africa Blog
Cyber Crime
ESET East Africa Blog
Ransomware
ESET East Africa Blog
Antivirus

ESET Picks

1

Why Financial Institutions are being hit hard by Cyber Criminals

2

Why Africans should be worried about PETYA

3

How to make a strong password

4

WannaCryptor: What you need to know about the ransomware

5

Why Kenyans should take cyber security seriously