Why Kenyans should take cyber security seriously 0 1194

  • Cybersecurity can contribute immensely to the creation of quality employment opportunities for Kenyan citizens.
  • Kenya is yet to embrace any effective data protection regulations and the consequences are pretty evident in the Kenyan digital economy.
  • With the increased terrorist activities within Kenya, the Internet presents national enemies such as the Al-Shabaab and other extremist groups with a unique and ubiquitous opportunities.
Kenyan cyber security

There is no simple way to say this. Cybercriminals are pilfering Kenyans blind. The latter statement has been evidenced by the statistics present in the recent Cybersecurity Report published by Serianu, which asserts that Kenya lost about $175million last year. Moreover, the Report managed to establish that cybercrime perpetrators are deliberately targeting the Kenyan digital economy with the intention of wreaking havoc and making away with millions.

In terms of cyber resilience, the Kenyan digital economy can be likened to a slow, plump gazelle stumbling through the “cyber-savannah” in the full view of agile, informed and hungry cyber-predators who have begun to sink their teeth into their sumptuous prize.

Another daunting revelation is that organisations which have suffered substantial data breaches (which include reputable banks, insurance companies and SMEs) have decided to remain mum, much to the detriment of their clientele whose actual data is exploited for monetary gain by cybercriminals.

Regardless of the increased cybercrime incidents within the region, the state of Kenya’s digital economy is indeed on the rise.

Thanks to the concerted efforts of the private and public sector in creating an enabling environment, statistics published by the Communication Authority of Kenya in the first quarter of the 2016-2017 financial year highlight that the internet penetration rate in Kenya is at a robust 85%, with over 37 million internet subscribers who exchange data over various internet-based platforms.

These glowing statistics indicate the notable confidence in the quality of service provided by various digital companies. The latter can be attributed to the numerous marketing campaigns designed to reinforce consumer trust in digital services, but can Kenyans really trust good PR routines when it comes to the safety of their data?

The internet penetration rate in Kenya is at a robust 85%, with over 37 million internet subscribers Click to Tweet

What is in it for Kenyans if they begin to take their cyber security more seriously?

1. Jobs, Jobs and more Jobs:

Unemployment is a major challenge that affects youth across Kenya. Approximately 800,000 young Kenyans enter the labour market every year and youth unemployment is estimated to be as high as 35%, compared to the overall national unemployment rate of 10%.

Furthermore, 80% of unemployed Kenyans are below 35 years old. Notably, However, 70 per cent of the employed lot are under paid hence unable to take care of day-to-day needs. Thus, it can be demonstrated that unemployment will remain a thorn in the flesh until quality jobs can be created to further the development of the Kenyan populace.

Cybersecurity can contribute immensely to the creation of quality employment opportunities for Kenyan citizens.

Per the Kenya Cybersecurity Report, published by Serianu in 2016, the current number of internet subscribers stands at 37,716,579 users who are in turn served by only about 1400 certified cybersecurity professionals (these professionals are categorised as individuals who have attained CISA, CISM, GIAC, SANS, CISSP, CEH, ISO 27001 and PCI DSS QA certification).

Teddy Kungu, Country Manager of ESET East Africa has been famously quoted for stating that each cyber security professional in Kenya serves a population of at least 280000 citizens.

Per a 2003 study carried out by Deloitte Touche Tohmatsu (DTT), it was recommended that ideally one information security professional should serve every 1000 general users.

Not only does it makes sense to fill the demand for cybersecurity specialists, it also makes a lot of cents.

Jobs in the field of cyber security are outpacing job creation in the IT industry and can pay up to $6,500 USD more annually, or almost 10% more, than the average salary of average IT workers.

While many job positions in cybersecurity will require additional certifications, such as the CISSP, it’s far from impossible to migrate into a security position from other IT focuses. For newcomers to the IT field, there is also room to start out on a cyber security career path beginning with an entry level role as a security analyst.

2. Tougher Protection Regulations will Protect Citizens

Kenya is yet to embrace any effective data protection regulations and the consequences are pretty evident in the Kenyan digital economy.

Institutions handling sensitive data, such as banks, insurance firms and hospitals have no legislative obligation to disclose any data breach incidents to their unsuspecting clients.

The latter has contributed significantly to the web of secrecy spun around the value and occurrence of cyber crime incidents within Kenya. Kenya needs to note that clandestine behaviour only favours cyber criminals who thrive in markets that suffer silently.

Notably, most cyber crime occurrences chiefly affect the constitutional rights of consumer protection and privacy, significantly injuring the citizens.

With the enforcement of the General Data Protection Regulations in Europe, which compel institutions to disclose data breaches which affect EU citizens and non-EU citizens alike within European data centres, cyber criminals may be forced to seek greener pastures to ply their trade.

Kenya is a prime target, with immense income potential but not much regulatory and technical might. Cyber crime will continue to escalate in our region if citizens remain indifferent and the Government continues to rest on its laurels when it comes to updating their policies regarding cyber security in Kenya.

3. Cyber-bulling among the Youth needs better safeguards

The dark nexus between education, young minds and inadequate safeguards against cyber aggression has led to truly tragic cases of cyber-bulling within the developed and developing world.

An apt definition of cyber-bulling was coined by the Centre for Justice and Crime Prevention in South Africa which stated that cyber bullying, cyber violence, cyber aggression, internet bullying, electronic bullying, internet harassment or online harassment are terms used to refer to violence and aggression perpetrated through ICTs.

These cruel acts may include the sending of harassing emails or instant messages, posting obscene, insulting and slanderous messages on online bulletin boards or social networking sites, or developing web pages to promote and disseminate defamatory content.

The impact of cyber-bulling is particularly significant among girls.

Per a Report regarding cyber-violence against women and girls, published by The United Nations Broadband Commission for Digital Development Working Group on Broadband and Gender, about 73% of women and girls are abused online.

Kenyans need to act against these occurrences as it is in their best interest to protect the dignity of their women and children whilst enjoying digital services.

4. Children Need to be protected from Radicalisation and the Internet

With the increased terrorist activities within Kenya, the Internet presents national enemies such as the Al-Shabaab and other extremist groups with a unique and ubiquitous opportunity to access the susceptible young minds of our children to plant their vindictive perceptions of society.

Dr. Quintan Wiktorowicz, an internationally acclaimed expert on national security engagement and counter-terrorism produced a radicalization process model which highlights the initial need for a cognitive opening.

For the process of radicalization to achieve success, there must be an avenue to connect with a person who is receptive to the possibility of new ideas and world views. He highlights that insofar as the nexus between digital connectivity and radicalism is concerned, impressionability is vulnerability.

Impressionability is vulnerability. Dr. Quintan Wiktorowicz Click to Tweet

It is thus vital that whenever digital devices are availed to children safeguards should effectively be put in place. This should be widely adopted by Kenyan families through parents and legal guardians whose societal duty is to preserve the morality of their children.

Ignorance Injures Kenya’s socio-economic development

In one of Mzee Jomo Kenyatta’s landmark speeches, he famously stated that there existed three enemies to the Statehood of Kenya; the first was poverty, the second : disease and lastly: the plight of ignorance.

The ignorance of the impact of cybercrime within Kenya has already cost the nation millions of dollars and it threatens to exploit the data footprint of past, present and future generations. Kenyans must recognize the incentives of standing up for their data security and accept their role as guardians of their own information.

In order to enjoy safer technology, we must understand that security begins with you and me.

Previous ArticleNext Article

Ransomware Protection Crucial to Enterprise 0 275

Ransomware

Ransomware is by far the biggest threat among Enterprises.  So what is Ransomware? It is a malicious code that blocks or encrypts the contents of a device and demands a ransom to restore access to the data.

According to research done by ESET,  Companies named ransomware their number one concern.

In response to customer needs and concerns, ESET integrated Ransomware Shield into its security solutions. ESET has long been providing its customers with very good behavior-based malware detection and also with Host-based Intrusion Prevention System (HIPS) that allows users to set custom rules for the protection against ransomware. However, should something slip past the 11 other security layers, Ransomware Shield will be automatically activated.

While ransomware infection often starts with clicking a suspicious link or a fictitious invoice, ESET found that email remains the most common distribution method.

To combat these scenarios, enter ESET Dynamic Threat Defense (EDTD). EDTD provides another layer of security for ESET products like Mail Security and Endpoint products. It utilizes a cloud-based sandboxing technology and multiple machine learning models to detect new, never before seen type of threats. In result, attachments that were classified as malicious are stripped off the email and the recipient gets information about the detection.

To learn more about how ESET can protect your business, and to book a FREE in house Cybersecurity Training Session for your employees, please sign up below.

Free Training

Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise 0 193

cybersecurity challenges enterprise
Ken Kimani, Channel Manager of ESET East Africa, introduces the 6 biggest cybersecurity challenges for enterprises

Enterprises are under constant attack from cybersecurity threats resulting in the loss of millions in revenue annually. Factors such as ransomware, targeted attacks, insufficient network visibility, various operating systems in an organization, bad security behaviour among office staff, lack of skilled cybersecurity workforce and the level of tolerance among staff are the major causes of cyber-attacks in the country.

To mitigate these issues, ESET East Africa offers free training, suitable for all skill levels to help educate enterprises on the importance of cybersecurity.

Subscribe to our newsletter to find out more about this training, our enterprise offering and to follow our series on the 6 Biggest Cybersecurity Challenges for Enterprises.