Teddy Njoroge on building the brand and revenues for ESET in East Africa 0 295


For long, since the time I bought a laptop in late 2000’s that is, I used to think – and believe – that ESET was just the free anti-virus software for PCs, nothing else. At this time, I didn’t bother much about where the anti-virus came from or whether there exists a non-free (or premium) version of the same. But this notion soon changed, more so when I began to learn more about the ESET as a company from Teddy Njoroge who has been in charge of establishing and building the ESET brand in Kenya and wider East African region for the past year. Read on as Teddy shares more about his career journey as well as more about his challenges and successes in building the ESET brand in the region…

Who is Teddy Njoroge?

TEDDY NJOROGE: I’m generally a warm and reserved individual who has a zeal for success in whatever it is I do. I have a great passion in management and building companies from Startups to big enterprises. This I believe is always the best path to understanding every element of running any organization in any vertical.

Q: You’ve transitioned from working at a call centre to managing the regional operation of a multinational IT security firm in less than 10 years. Did you see this happening in say 2010?

TN: I must say this was a vision I had. Managing an enterprise has been by dream. I literally positioned everything I did to align with what I wanted to achieve. I was very interested in running a multinational company. I have a Bachelor’s degree in Computer Science which gave me an understanding of the existing technologies and the path technology is advancing to. I felt I needed business management skills so as to enhance the capabilities I had in the ICT Field. I then tackled a Masters in Business Administration. This took me to the next level of integrating ICT into business. I also felt I needed to have the skill of understanding my customers. I did a course in BPO which led me to working in a call center. With this combination, I was ready to embark on hunting for the specific opportunity to put my knowledge into practice and here I am. So yes, this is something I was looking forward to and knew would come through.

Q: You’ve been the regional ESET boss for almost a year now. During this time, what can you highlight as your greatest challenges and achievements?

TN: It’s been a steep hill for me but a lot has been learnt. I plunged into Security and did not have much expertise in the Infosec sector. I had to get back to the books and understand what this was all about. Once the good understanding of the field was done, it was time for me to come up with a good team to build this brand with. Establishing the best out of the best was one huge challenge but eventually everything fell into place.

My main challenge has been to build the brand and also bring in consistent revenue to the business. We are in a market where other brands have presence and have a chunk of the market share. I had to balance between building awareness and also bringing in revenue.

We have various achievements whereby we have managed to create good brand awareness. We have a solid solution that has prevented various ransomware attacks globally and this has given us great mileage. We have seen a shift of clients from other vendors to our product line within a short while of existence in this market.  We have always been good in support and that has cut across all continents and this has also given our clients great confidence in East Africa. Our client portfolio has tremendously grown and we look to tripling this in the next few months as the uptake is overwhelming good for our business.

Q: Related to the above question, how did you address the challenges you encountered along the way and what did you learn in the process? 

TN: We have ensured that we are often releasing information to the public in regard to securing devices used by the common wananchi as they have proved to be the main gateway for 90% of cyber-attacks in the country and the region at large. We are in the media talking on Cyber Security and what organizations should look out for to ensure their environments are secure. We have also come up with great promotions for the public and good pricing/ discounts for organizations.  This market is price sensitive and we have cut our prices to ensure we offer exactly what the clients in this region want which is simply a superior product at an affordable price and this has worked perfectly.

Q: ESET as an IT security brand is relatively new in this market. How are you working to ensure that you get a sizeable chunk of the market – what strategies, initiatives and partnerships have you put in place to attract clients?

TN: First and foremost, we had to get our pricing right. We have very affordable prices and great discounts for the various verticals that we have. We ensure we participate/sponsor in the various ICT events to create awareness and also bring out the technology we have to ensure businesses are safe. In addition, we are reaching out to the various ICT companies that are established for partnerships. We ensure that we support our partners through our various certification levels to ensure they provide the required client support. Support is key for us and we have to always ensure the client is happy at all times.

Q: Being in charge of the East Africa region gives you an opportunity to have first-hand information about IT security challenges in Kenya, Uganda, Rwanda and Tanzania. From your assessment, are the challenges the same throughout the region or are specific countries grappling with their own unique IT security issues?

TN: Cyber Security challenges cut across the region. What differentiates the severity is how technology-advanced the countries are. Currently, Kenya leads in Technology and the rest of the countries follow. Kenya has been highly hit by cyber attacks thus the big numbers in monies lost compared to the other countries. We are in the global map due to our great innovations in mobile money platforms thus the great interest of hackers to attack our systems.

Q: In mid May this year, you supported calls for a shared reporting system for cyber-security related incidents in the country. Does it mean IT security solutions vendors don’t work in collaboration with the government’s National Kenya Computer Incident Response Team Coordination Centre (KE-CIRT/CC)? How is the current structure of engagement between the industry – solutions providers and their client organizations – and KE-CIRT/CC?

TN: I must admit that there is no reporting framework in place to report breaches. Vendors are not working closely with KE-CIRT/CC. This is where things need to change as KE-CIRT/CC has the platform to notify the public and the vendors have the actual data translating to crucial information that would help achieve this. We are at a time vendors are busy competing with each other on who has the solution that has done this or that and we miss the main point which is to protect our organizations. We are at a time that we should not drop boxes in the market but walk the journey with our clients. Remember most organizations don’t possess the necessary skills set to manage the IT Security divisions. Vendors should come together and provide info to the KE-CIRT/CC that will assist them in disseminating helpful information.

Q: With all the technology and knowledge possessed by the IT security industry, how is it that very few cybercrime incidents get nipped in the bud before they happen, how come the bad guys seem to be always ahead of the good guys?

TN: It’s simply because we lack Cyber Security experts in this region. We also have poor budgets for cyber security solutions. When these things are put together, then a major loop hole is created thus we are forced to be re-active than pro-active.

Q: In your view, apart from malware and ransomware, where should the IT security industry now keenly look at to avert any major breaches of a global magnitude in future? Where is cybercrime moving to next?

TN: Ransomware will be the main thing. What will change is the ways and mechanisms used to orchestrate this. Mobile ransomware is on the rise and this will be the root cause of many of our problems. Another avenue coming in is the attack on industry systems. Manufacturing plants and enterprises that utilize technology to produce their products will be highly hit.

Q: Having been in the IT industry for quite a while, who do you look up to for inspiration and motivation? Professionally, who’s your mentor?

TN: My mentor would Larry Ellison – Oracle Founder. He simply came up with a solution that is a crucial part of most financial institutions globally among other industries. He basically saw a need and tapped into it and his solution has been revolutionizing the IT world. His Consistency has made him who he is today.

Previous ArticleNext Article

Coming to terms with cyber security nightmare 0 196

Teddy Njoroge

Last year internet security companies made forecasts about possible cyber-threats to really worry about this year. This we followed with measures that companies and individuals needed to take to ensure a cyber-safe 2018. Paramount among these was the need for proactive use of protective software tools as well as sensitisation and training of users about these threats.

True to predictions, 2018 started with a scenario hardly anyone could have foreseen. Two serious design vulnerabilities in Computer Central Processing Units (CPUs) were exposed that could enable cyber-criminals to steal sensitive or private information such as passwords, documents and photos among other data from unsecured devices.

The “Meltdown and Spectre” CPU vulnerabilities point to a much larger underlying issue. Software bugs and hardware bugs are more common than not, but these once identified can be fixed fairly easily with either a software patch or firmware update for hardware issues.

However, as it turns out this is not possible with these two vulnerabilities as they are caused by a design flaw in the hardware architecture, only fixable by replacing the actual hardware. And that is where the problems begin.

CPUs of affected manufacturers such as AMD, ARM, Intel, among others appear in a lot of Internet of Things (IoT) devices and which are scattered all over the globe.

According to ARM, they are already “securing” a trillion (1,000,000,000,000) devices. Granted, not all ARM CPUs are affected, but if even 0.1 per cent of them are, it still means a billion (1,000,000,000) affected devices.

Due to the huge costs involved, it is not feasible to replace all these faulty CPUs. In reality people will keep their existing devices until end of their life cycles, for years even.

Deployed for countless and diverse applications in the households or offices, once operational many owners have most likely forgotten that they have them and which inherently leaves a giant gap for cybercriminals to exploit.

Any Wi-Fi-controlled device such as refrigerator, digital picture frames, Smart TVs, DVRs and PVRs etc., potentially provides opportunity for sensitive data to be lost. For example, a compromised Wi-Fi password for any of these can make it possible for anyone to hack your home or office network thus giving automatic access to any other connected platform such as emails, social media pages and even shared cloud or archive platforms.

Even though to get access to your IoT device, a would be attacker needs to have compromised the internet network already, or even the applications running on the device, we know that cyber-criminals just like a pack of wolves will not relent after smelling blood.

As a warning, when you are buying a new IoT device, ensure to check which CPU it is running on, and if that CPU is affected by these vulnerabilities.


Meltdown and Spectre 0 300

 Microsoft released Security Advisory 18002 on Wednesday, January 3, 2018 to mitigate a major vulnerability to Windows in modern CPU architectures. ESET released Antivirus and Antispyware module 1533.3 the same day to all customers to ensure that use of our products would not affect compatibility with Microsoft’s patch.

The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel’s Core architecture used in PCs for many years, as well as processors from AMD, and even affecting ARM processors commonly used in tablets and smartphones.

The good news is that ESET can help protect against the types of malware that could take advantage of these vulnerabilities.

And, ESET was one of the very first security vendors to allow the Microsoft patch against the flaw to be enabled.

While ESET protects against potential malware infection, you should also take these steps to secure your computers and data:

  • Make sure your browser is up to date. For Chrome or Firefox users:
    • Mozilla has released information describing their response, including how Firefox 57 will address these security flaws.
    • Google has stated, “Chrome 64, due to be released January 23, will contain mitigations to protect against exploitation.” In the meantime, you can enable “Site Isolation” found in current stable versions of Chrome to provide better protection.
  • Make sure you update your ESET software, then update your Windows OS to protect against this exploit. To update ESET:
  • Customers should review ESET’s Knowledgebase article for important updates.
  • See this great collection of tips, articles and recommendations from the Google Project Zero team.
  • If you have a cloud-based server or have a website hosted by hosting provider, check to see what mitigations they have implemented already to prevent Meltdown.