ESET East Africa Blog ESET East Africa Blog
ESET East Africa Blog ESET East Africa
ESET East Africa Blog ESET East Africa Blog
  • Cyber Security
    • Cyber Security
      • Man working on computer at home
        Forecasting Work from Home Cyber Threats in Our New Normal
      • wi-fi router
        11 Hacks for boosting your Internet Speed Connection while WFH
      • Coronavirus Themed Scams and Lies You Should Know
      • Man working from home
        How to Secure Your RDP and Remote Access
      • Woman working at home on laptop
        Secure Videoconferencing: The Basics
    • Cyber Crime
      • Man working on laptop
        Coronavirus con artists continue to thrive
      • cybersecurity challenges enterprise
        Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise
      • Approximately US $150,000 worth of Ethereum-based cryptocurrency stolen
      • Meltdown and Spectre
      • Phishing email
        Black Friday Cyber Monday – Stop … Look … Think!
    • Ransomware
      • Man working on computer at home
        Forecasting Work from Home Cyber Threats in Our New Normal
      • Ransomware
        Ransomware Protection Crucial to Enterprise
      • cybersecurity challenges enterprise
        Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise
      • Approximately US $150,000 worth of Ethereum-based cryptocurrency stolen
      • Security trends to look out for in 2018
  • Research
    • Research Posts
      • cybersecurity challenges enterprise
        Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise
      • ESET research team assists FBI in Windigo case
      • ESET solution praised for low system impact by AV-Comparatives
      • Win32-Industroyer
        Win32/Industroyer: A new threat for industrial control systems
      • ESET Trends 2017 in Android Ransomware
        ESET Trends 2017 in Android Ransomware
      • ESET Trends 2017 – Security Held Ransom
        ESET Trends 2017 – Security Held Ransom
  • Technology
    • Android
      • Securing multiple operating systems on a single network? It is manageable
      • Fake Security App
        Beware: ad slingers thinly disguised as security apps
      • Malware alert for Android
        Malware alert for Android phone users
      • Ransomware Android Phone
        Ransomware: Cause for Alarm for Android Phone Users
      • New parental control app
        New parental control app monitors children’s online activities
    • Linux
      • Securing multiple operating systems on a single network? It is manageable
      • ESET research team assists FBI in Windigo case
      • Serious Linux vulnerabilities
        The importance of patch management after serious Linux vulnerabilities
    • Windows
      • Securing multiple operating systems on a single network? It is manageable
      • ESET Chrome Cleanup
        ESET and Google combine to improve Chrome
      • Understanding Wannacryptor
        WannaCryptor: What you need to know about the ransomware
  • Video
    • Video Posts
      • VideoCyber Crime Prevention
        What you need to know for Cyber Crime Prevention
      • Alistair Freeman Interview On EBRU TV
        Alistair Freeman Interview On EBRU TV
      • How to make a strong password
        How to make a strong password
      • Poor cybersecurity costs Kenyan companies billions in losses yearly
        Poor cybersecurity costs Kenyan companies billions in losses yearly
      • What is encryption
        What is encryption and how does it work?
      • What is cyberbullying
        What is cyberbullying and how to defend against it?
  • Opinion
    • Opinion Posts
      • Why Parents need to defend their homes against the deep waters of the Internet
      • Ransomware ESET East Africa
        Ransomware the next big threat to data
  • Featured
    • Featured Posts
      • Convergence Partners acquires Stake in ESET East Africa
      • ESET solution praised for low system impact by AV-Comparatives
      • ESET receives Bronze Award in the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
      • Teddy-Njoroge-ESET-Country-Manager-Kenya
        Teddy Njoroge on building the brand and revenues for ESET in East Africa
      • Free online cybersecurity training
        Free online cybersecurity training for businesses in Kenya
      • cybersecurity breach reporting
        Calls for standardized cybersecurity breach reporting
  • ESET Main Website
  • ESET Store
  • Virus Radar
  • About ESET
  • Contacts

Latest Stories

Man working on computer at home

Forecasting Work from Home Cyber Threats in Our New Normal

wi-fi router

11 Hacks for boosting your Internet Speed Connection while WFH

Coronavirus Themed Scams and Lies You Should Know

Social Connect

Security Tips

ESET East Africa Blog > All Articles > Security Tips
wi-fi router
COVID-19, Cyber Security, Malware, Security Tips, Technology

11 Hacks for boosting your Internet Speed Connection while WFH 0 1083

Dennis Waliaula2021-01-19 10:37 am2021-01-19

As the COVID-19 pandemic continues redefining how we work, many employees working from home are likely to experience slow internet …

Man working from home
COVID-19, Cyber Security, Privacy, Security Tips

How to Secure Your RDP and Remote Access 0 1029

Michelle Kuria2020-04-23 2:47 pm2020-04-23

As work from home is the new norm in the COVID-19 era, you’re probably looking to enable remote desktop connections …

Cyber Security, Enterprise, Security Tips

Cyber-attack risks for companies with employee origins 0 1046

Dennis Koome2019-10-09 9:45 am2019-09-26

As part of the initial security relationships we build with new clients, ESET surveys management and responsible employees about what …

Security Tips, Technology

Network security solutions’ value proposition to be found in improved insights 0 1022

Dennis Koome2019-10-02 9:45 am2019-09-26

The work of a large company’s IT security experts consists of safeguarding the network, the business infrastructure and devices, and …

Cyber Security, Security Tips

Shortage of IT security specialists? Outsourcing security services may be an option 0 921

Dennis Koome2019-09-26 11:07 am2019-09-26

Research shows that the East Africa is facing a critical shortage of IT specialists. Another standout issue relates to the …

Ransomware
Cyber Security, Enterprise, Ransomware, Security Tips

Ransomware Protection Crucial to Enterprise 0 1849

Dennis Koome2019-07-24 9:15 am2019-07-24

Ransomware is by far the biggest threat among Enterprises.  So what is Ransomware? It is a malicious code that blocks …

cybersecurity challenges enterprise
Cyber Crime, Cyber Security, Enterprise, Hacking, Ransomware, Research, Security Tips

Interview: Addressing the Six Biggest Cybersecurity Challenges for Enterprise 0 1445

Dennis Koome2019-07-01 10:50 am2019-07-01

Enterprises are under constant attack from cybersecurity threats resulting in the loss of millions in revenue annually. Factors such as …

Twitter Password
Cyber Security, Security Tips, Social Media

Time to change your Twitter password 0 1508

Dennis Koome2018-05-08 10:24 am2018-05-08

An internal bug exposed the passwords of an undisclosed number of the more than 330 million Twitter users. Twitter CTO …

Cyber Crime, Ransomware, Security Tips

Approximately US $150,000 worth of Ethereum-based cryptocurrency stolen 0 1877

Dennis Koome2018-04-26 1:55 pm2018-04-26

Online cryptocurrency website MyEtherWallet.com has confirmed that some visitors could have been temporarily redirected to a phishing site designed to steal users’ …

Security Tips

ESET’s guide makes it possible to peek into FinFisher 0 1831

Dennis Koome2018-01-24 9:30 am2018-01-24

FinFisher, also known as FinSpy, has a history of being used in surveillance campaigns, both against legitimate targets and against …

Posts navigation

1 2 3 Next

Receive Latest Posts Weekly

Please follow & like us

RSS
Facebook
Twitter
LinkedIn
Instagram

Most Popular Right Now

1

Five Things About the ESET Partner Programme You May Not Have Known 6324

2

What is cyberbullying and how to defend against it? 3174

3

Ensure your business’ digital infrastructure survives the 2017 Kenyan elections 3145

4

3 Ways Scammers Are exploiting Coronavirus Fears 3076

5

The role of Kenyan Legal Professionals in Cybersecurity 2834

Recent Posts

  • Forecasting Work from Home Cyber Threats in Our New Normal
  • 11 Hacks for boosting your Internet Speed Connection while WFH
  • Coronavirus Themed Scams and Lies You Should Know
  • How to Secure Your RDP and Remote Access
  • Secure Videoconferencing: The Basics

Archives

  • February 2021
  • January 2021
  • May 2020
  • April 2020
  • March 2020
  • October 2019
  • September 2019
  • July 2019
  • February 2019
  • August 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • December 2016
  • November 2016
  • October 2016
  • July 2016
  • June 2016
  • March 2016
  • February 2016
  • December 2015

Categories

  • Android
  • Antivirus
  • Apps
  • COVID-19
  • Cyber Bullying
  • Cyber Crime
  • Cyber Security
  • DDoS
  • Email
  • Enterprise
  • Featured
  • Hacking
  • IOT
  • Linux
  • Mac
  • Malware
  • Opinion
  • Partner Programme
  • Privacy
  • Ransomware
  • Research
  • Security Tips
  • Social Media
  • Technology
  • Uncategorized
  • Video
  • White Papers
  • Windows
ESET Africa Blog

Choose Topic

  • All Articles
  • Cyber Security
  • Cyber Bullying
  • Ransomware
  • Hacking
  • DDoS
  • Security Tips
  • Partner Programme

Most Discussed

1

3 Ways Scammers Are exploiting Coronavirus Fears 1

2

New parental control app monitors children’s online activities 0

3

USB drives with built in antivirus launched 0

Popular

ESET Partner Programme

Five Things About the ESET Partner Programme You May Not Have Known

What is cyberbullying

What is cyberbullying and how to defend against it?

digital-infrastructure-survives-2017-kenyan-elections

Ensure your business’ digital infrastructure survives the 2017 Kenyan elections

Partner with ESET

ESET Africa Blog
ESET Kenya Blog
  • CONTACT
  • PRIVACY
  • LEGAL INFORMATION
  • REPORT VULNERABILITIES

© 1992 - 2017 ESET, spol. s r.o. - All rights reserved. Trademarks used therein are trademarks or registered trademarks of ESET, spol. s r.o. or ESET North America. All other names and brands are registered trademarks of their respective companies.

Menu
  • ESET East Africa Blog
  • Catagories
    • Cyber Security
      • Cyber Bullying
      • Privacy
      • DDoS
      • Malware
      • Cyber Crime
    • Research
      • White Papers
    • Technology
    • Video
  • About Us
  • Contacts
Contact Info
Unit 2, The Mirage, Chiromo Road, Westlands, Nairobi
+254 207 607 004
sales@esetafrica.com

Most Popular Topics

ESET East Africa Blog
Cyber Security
ESET East Africa Blog
Cyber Crime
ESET East Africa Blog
Ransomware
ESET East Africa Blog
Antivirus

ESET Picks

1

Why Financial Institutions are being hit hard by Cyber Criminals

2

Why Africans should be worried about PETYA

3

How to make a strong password

4

WannaCryptor: What you need to know about the ransomware

5

Why Kenyans should take cyber security seriously