Top Threats in Kenya Cyber Space 2013
Malware is evolving and come bundled with very advanced capabilities that attempt to evade Intrusion Prevention/Detection Systems and Anti virus utilities.
Quarterly Cyber-Threat Analysis 2013
Malicious activity in the Kenyan Cyber Space is rapidly growing, both internet users and enterprises are at risk of attacks and exploits while online
Internet uptake and Threat Activity 2013
Growth of malicious activity in Kenya is consistent with the increase of internet uptake. New internet subscribers are now more exposed to online attacks
Top Attacking Countries 2013
Multiple attacks are now originating from Kenya, the rise of skilled and tech-savvy internet users are actively contributing to malicious activity online.
Top Attacked Ports 2013
Hackers are continuously scanning and attacking commonly used ports for services that they can exploit. Poorly configured services can be a gateway to your corporate internal network.
We work with different local and international stakeholders to anticipate threats and potential vulnerabilities.
We have deployed tools, technologies and other mechanisms that enable us to detect cyber threats and attacks.
Respond and Contain
We have established processes and procedures to adequately respond to and contain cyber threats.