The role of Kenyan Legal Professionals in Cybersecurity 0 1906

  • Over 26.7 million Kenyans are currently online and engaging in digital transactions daily.
  • According to UN Research, at least one out of ten mobile money transactions in the World occur in Kenya.
  • These statistics make Kenya a prime target for cybercriminals who, according to the National Cybersecurity Strategy, published by the Ministry of ICT, have continued to evolve in terms of the complexity and severity of their attacks.
  • Unfortunately, Kenya shows a staggering lack of awareness and investment in cybersecurity solutions wit around 96% of all organisations investing less than $5000 in cybersecurity.
Kenya cybercriminal activity

According to the words of the Honorable Warren E. Burger, lawyers and judges remain necessary to society, so long as it is a place where men and women are gathered, as they must fulfil the noble role of healing conflict and providing reason as a lubricant to the rigours of the socio-economic engine which ought to drive the development of any civilisation.

Moreover, it is the role of the legal minds of society to act as sentinels, standing guard against man’s threat unto himself, his own inclination towards self-enrichment at the detriment of the common good in its entirety.

As such, society gives the highest of legal minds the power to influence, pass or ratify policies, to ensure their safety and continuity against the overwhelming urges of vices, human wickedness and in certain cases, natural catastrophes.

The legal minds of Kenya can thus be termed as, not only stewards of conflict resolution,but also as sentinels, who wield the power of policy-making to safeguard the development and evolution of the socio-economic organs of the nation-state whose well-being remains pivotal to Her survival.

Kenya is facing an exponential increase in cybercriminal activity

The digital wave has hit Kenya, and its effect upon our economy has been immensely positive. With the development of innovative products such as Safaricom’s M-Pesa money transfer service, as well as iCow, a farming digital product that has optimized dairy farmers’ productivity, the consumer market has developed an appetite for sound, data-centric solutions in order to enhance the various socio-economic activities present within Kenya.

The effect of digitisation in our economy has been significant. Since the advent of M-PESA, more than 73.1% of Kenyans are now formally banked.

In addition, according to the Quarterly Statistics Report for the Financial Year of 2016 (April-June 2016), mobile data/ internet subscriptions stood at 26.7 million during the quarter marking an increase of 8.3 per cent from 24.7 million subscriptions posted in the preceding quarter. The number has grown remarkably by 35.0 per cent from the same period of the previous year.

This essentially means that over 26.7 million Kenyans are currently online and engaging in digital transactions daily.

Kenya also boasts the largest mobile money transaction service in the World. According to UN Research, at least one out of ten mobile money transactions in the World occur in Kenya.

These statistics make Kenya a prime target for cybercriminals who, according to the National Cybersecurity Strategy, published by the Ministry of ICT, have continued to evolve in terms of the complexity and severity of their attacks.

The evolution of cyber threats between 2006 and 2012 are an iconic example. These threats include; Advanced Persistent Threats, Botnet Threats, Converged Threats, Cyberterrorism and Next Generation DoS (inclusive of DDoS).

The socio-economic impact of cybercrime in Kenya has been immense. According to a Serianu Cybersecurity Report, Kenya’s losses as at 2016, stood at a whopping $185m, a sharp increase from the estimated $100m lost in the previous year.

Notably, when cybercriminals face justice, only about 2% of prosecutions are successful. This can be attributed to the lack of proper regulation regarding data protection and cybersecurity, and the lack of appropriate measures to collect sufficient evidence to enable criminal prosecution.

The Legal Profession and the unique risks posed to them by cybercriminals

 

Kenya cybercriminal activity

Numerous professions in Kenya are facing digitisation as well. The legal industry has not been an exception. With the incorporation of modern filing systems, the use of e-mails and digital devices such as mobile handsets and laptops within law firms and legal offices, sensitive client data is being transacted and stored at a digital level across various platforms in various forms. Cybercriminals are aware of this and can exploit the gaps present in various ways.

A staggering lack of awareness and investment in cybersecurity solutions

Notably, around 96% of all organisations in Kenya invest less than $5000 in cybersecurity. A significant percentage of these sampled organisations consist of law firms, financial institutions, NGOs and governmental bodies where legal and compliance advisors safeguard the agenda of their respective institutions.

Around 96% of all organisations in Kenya invest less than $5000 in cybersecurity Click to Tweet

This highlights how low a priority cybersecurity is for institutions who are the custodians of sensitive data which can be compromised for profit by cybercriminals.

Man-in-the Middle Attacks

Legal practitioners often handle particularly sensitive internal or external, i.e. client information to carry out their mandate. An ideal example would be where numerous clients correspond with their hired advocates via e-mail, transacting confidential documents and data over the Internet with the faith that those communication channels are encrypted or secure. This makes law firms particularly prime for man-in-the-middle attacks.

A man-in-the-middle occurs where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

An example would be where files were intercepted over the network, and redirected to hostile parties, who then changed the details of those files and dropped them back into the firm’s filing system.

The entire scam could go on for months, until all the data is collected and collated by the criminals, and subsequently utilised in a terrible heist of client funds.

Various rights of the client had been substantially breached, such as their constitutional right to privacy and, if the law firm had no cybersecurity measures in place, a valid claim under the tort of negligence, as the advocate in question had failed to fulfil an essential duty of care in protecting the client’s information.

The loss of a client’s data integrity

The loss of a client’s data integrity remains one of the largest risks for any legal enterprise. This is due to its resultant effect which is a substantial erosion of trust and an adverse breach of the client confidentiality relationship which is part and parcel of the legal profession.

Data leaks can lead to truly disastrous results for any legal practice once their clients’ data is made public by hackers, regardless of their motivation. A prime example could be the occurrence of the Panama Papers leak in 2015.

The Panama Papers are 11.5 million leaked documents that detail financial and attorney–client information for more than 214,488 offshore entities. The documents, which belonged to the Panamanian law firm and corporate service provider Mossack Fonseca, were leaked in 2015 by an anonymous source, some dating back to the 1970s.

The leaked documents contain personal financial information about wealthy individuals and public officials that had previously been kept private.

While offshore business entities are legal, reporters found that some of the Mossack Fonseca shell corporations were used for illegal purposes, including fraud, tax evasion, and evading international sanctions.

The damage to the reputation of the legal enterprise was immeasurable and to date, their clients’ data remains available for scrutiny for members of the Press and the public.

Ransomware

Cybercriminals are also targeting legal enterprises because of the urgency of the data required. Law firms require constant updates of their: research material regarding continuing court cases, recordings of proceedings, updated legal documents and documentary evidence.

Moreover, legal enterprises must be able to quickly retrieve, edit, update and restore their work files within those particular systems. This makes them prime targets for malicious attacks which lock users out of their various digital filing and retrieval systems.

A prime example of this would be the deployment of ransomware within a law firm’s IT environment. Ransomware, as the name suggests, demands the payment of ransom in Bitcoin, upon encryption of computer files within a system.

Other variations of ransomware, known as lock-screen ransomware lock out users from accessing the computer system and demand payment in Bitcoin to unlock and gain access.

Conclusion

A joint awareness campaign

In collaboration with numerous law firms in Kenya, ESET East Africa is engaging with certain legal practitioners based in Kenya’s digital market to raise awareness regarding the numerous risks present for their enterprises as well as the nation with the advent and growth of cybercrime within Kenya.

This will be done through joint events, programs and training sessions to sensitize legal enterprises about their issues.

Policy recommendations

As a driver of thought leadership across the globe, the ESET brand is honoured to collaborate with the lawyers and cybersecurity specialists in suggesting cybersecurity policies designed to safeguard the Kenyan populace from the evolved threat of cybercrime within Kenya.

Previous ArticleNext Article

How To Easily Set Up a VPN at Home 0 248

Woman working at home

As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks

Probably, you have been forced to work from home due to the COVID-19 outbreak (recommended to reduce the spread of the virus). However, you are wondering how you will set up your VPN to enable secure communication.

Well, don’t agonize too much; we shall first explain to you what a VPN entails. And then, provide you with a step by step procedure for setting a basic Virtual Private Network. Here we go!

First, what is a Virtual Private Network (VPN)?

Essentially, a VPN is a private channel within a wider (open) network that enables you to communicate with your peers (other nodes with similar settings) without leaking your information through the use of encryption.

Besides, you can utilize a VPN to initiate communication through any network without revealing your location. In any case, a significant number of vendors deal with clients needing such services to avoid being tracked or be able to bypass particular network filters. 

However, in our case, we shall consider a home office VPN that will create a communication tunnel for your practical and secure home office communication.

Is it necessary to set up a virtual private network?

For there to be any communication between two endpoints ─ your pc and the computer in the main office –, they must be configured.

In this case, you’ll require the services of your IT department (if you have one), who will guide you regarding the applications to install, as well as provide you with VPN credentials depending on your needs. Upon installing and configuring the said app, you can automatically establish communication through the provided link. Easy-peasy, right?

On the other hand, if you don’t have an IT department behind your back, then you may have to do it yourself. These shouldn’t; however, scare you at all; it’s not as tough as you might imagine.

But before we explore the nitty-gritty of setting up the VPN, we first need to identify the options we have. In our case, we shall examine two options:

  • Open VPN: standard in small office/home office and business-class routers
  • IP Sec: Is Built-in and commonly used by desktops, smartphones, and laptops

The Open Virtual Private Network

This type of VPN has been around for a long time and has proved itself secure and reliable. It is ideal for small office/ house offices, as well as business-class routers, thanks to its open-source nature.

Procedure for installation

  1. On a contemporary device, go to the router’s configuration screen and click the relevant buttons to access your office network
  2. Download the configuration file generated by the router
  3. Use this file to configure/setup the OpenVPN in your pc, smartphone, or desktop that you want to use to access the Network behind that particular router. In case you get stuck somewhere, you can download or follow an online tutorial for your specific router.
  4. Download the required apps that will enable you to access your new home office VPN from this website.
  5. Install the downloaded applications and then configure them using the files generated when setting up the Open VPN on your office router.

In the event you find the going tough, you can always consult with an online tutorial or IT personnel.

Internet Protocol Security

IPsec is also another technology that has been in use for an extended period to provide reasonable security. It utilizes the same working principles as the OpenVPN; however, it is mostly used on lower-cost routers. Besides, it is a built-in technology in most desktops, laptops, and smartphones; therefore, it eliminates the need for installing another application on your device.

The installation process is similar to that one of OpenVPN. However, implementing a particular router IPsec can sometimes be a little more complicated compared to installing an open VPN.

Fortunately, with the use of native tools on your remote endpoints, you can offset this by just typing in a few things, such as the required IP address and credentials.

Final thoughts

Conclusively, these are some of the simplest virtual net protection options you can install on your home system without requiring massive/no input from IT experts.

Importantly, you will need a beefier than standard broadband for quick communication over the VPN. Also, you may experience slower connections due to the much horsepower required to keep the connection encrypted and tunneled. Nevertheless, this is a small price to pay in exchange for a secure home office communication.

In case you required any advice regarding VPN options or installation services, then ESET has been here for you for over 30 years. We want to assure you that we will be here to protect your online activities during these uncertain times, too.

Protect yourself from threats to your security online with an extended trial of our award-winning software.

Try our extended 90-days trial for free.

How To Improve Communication Security with MFA 0 655

Person working on two factor authentication

Remote work can be much safer with the basic cyber-hygiene practices in place – multi-factor authentication is one of them

If you are working from home due to the coronavirus pandemic, it is essential to integrate two-factor authentication (2FA) or multi-factor authentication in your daily login routine. That way, you can beat fraudsters at their own game, since the security of your essentials isn’t wholly dependent on passwords alone.

The interesting bit with this technology is that you may have already seen it in action; for instance, when requesting access to your bank account via your smartphone. In this case, you must enter the one-time code sent to you in addition to your password to gain access.

See, enabling such double authentication processes on all your logins can make it difficult for scammers to access your accounts even if they compromise your passwords.

That said, you may now want to know which MFA option to use? Well, we take a look at some of the ways you can utilize MFA to bolster the security of your connections when working remotely.

  1. First, the use of a physical token

To implement this technique, you will require a physical device such as a security USB key, a key fob, or a similar item that will generate a secure code for verification purposes.

You’ll mostly be required to integrate this method if you need access to your cloud-based applications, online office applications, or corporate office technology. The YubiKey or Thetis is an example of such a device that you can purchase with less than US$50.

For convenience purposes, most of these devices are designed tiny; you can carry them in your pant pocket or hang them on a keychain for safety purposes. 

2. Use of a mobile phone

Most likely, you own a smartphone, right?

If yes, you can use it to boost your MFA security capabilities. For instance, you can download an authentication app such as Google Authenticator, ESET Secure Authentication, or Authy for your use.

The only caveat here is to ensure your source has a reputable security background. This is informed by the fact that the app is going to reside inside your smartphone, which is also vulnerable to security threats; therefore, robust security is required to avoid pre-emptying your security efforts.

Importantly, be on the lookout for spam messages when using your phone as they can trick you into compromising your accounts.

Fortunately, if you download applications from reputable sources, you can be offered a solution in case you have an issue with the platform itself.

3. Use of Biometrics

Factually, no single human being shares a fingerprint or retinal scan with another. This unique feature has been conveniently utilized overtime to provide robust multi-factor Authentication. 

You can also utilize the same to secure your connections.  For instance, you can take a picture of your face or scan your fingerprint using a biometric reader – currently, a common feature in smartphones or other devices ─, and then integrate it in your login procedure. These will prevent any other user from accessing your accounts or private information.

On the flip side, some folks feel that the technique is somehow creepy; therefore, give it a wide bath. Besides, it can present a challenge when you need to reset your bio features if your service provider is hacked.

Final thoughts

When scouting for a suitable MFA option for your needs, it is vital to consider one that can easily fit your routine. This stems from the fact that without proper utilization, an MFA option can’t protect you.

Similarly, an MFA technique can allow some side benefits as well. For instance, in the event of a security breach, you will be notified that your password has been interfered with; this can enable you to implement mitigation measures. Not only that, but you also get protected from the would-be attack since the fraudsters wouldn’t have access to your other factors.

In case you require a secure authentication application or consultation regarding MFA options, then ESET has been here for you for over 30 years. We want to assure you that we will be here to protect your online activities during these uncertain times, too.

Protect yourself from threats to your security online with an extended trial of our award-winning software. 

Try our extended 90-days trial for free.