Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»Cyber In(Security) In Kenya: The latest threats and how best to protect against them
    News

    Cyber In(Security) In Kenya: The latest threats and how best to protect against them

    Kaluka wanjalaBy Kaluka wanjalaNovember 9, 2018Updated:August 15, 20255 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    1022 Microsoft
    1022 Microsoft
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    Kenya has the highest internet penetration in Africa with over 31 million people having access to the internet, according to a report by Jumia Business Intelligence and GSMA Mobile.

    With more and more Kenyans connecting to the internet from mobile devices like phones and tablets, also comes the rise of mobile money transactions, access to loans and economic prosperity for the country.

    But with the acceleration of digitalisation comes insecure consumer habits. This coupled with a lack of coherent legislation and regulatory frameworks, as well as inadequate cybersecurity measures in key sectors, is turning Kenya into a lucrative target for cyber criminals.

    The country has been targeted by hackers in several major attacks over the past couple of years, and in 2017 Kenya lost approximately Sh21.2 billion to cybersecurity, second only to Nigeria which lost Sh65.5 billion.

    It’s important that organizations and their employees across Kenya are aware of the latest threats and how best to protect against them.

    Here are three of the biggest cyber threats currently facing the country:

    Battling botnets

    The word “botnet” is a combination of the words “robot” and “network“. Botnets can be infected with malware that allows hackers to remotely take control of a number of devices at a time, usually without the knowledge of the device owner.

    According to the latest Microsoft Security Intelligence Report, botnets continue to impact millions of computers globally, infecting them with old and new forms of malware. Cybercriminals use botnets to conduct a variety of online attacks, such as send spam, conduct denial-of-service attacks on websites, spread malware, facilitate click fraud in online advertising and much more.

    Defending against botnet activity is not an easy undertaking and requires a massive and coordinated effort by both private and public organisations. The first step in protecting organisations against botnets is to look for a solution that harnesses advanced machine learning.

    For example, Windows Defender ATP uses the power of the cloud, machine learning and behaviour analytics to detect, protect and respond against botnets and other cyber threats.

    Hackers turning to easy marks

    As the cost of circumventing security measures increases, hackers are progressively taking advantage of “low-hanging fruit” to circumvent increasingly sophisticated security measures.  There are three types of low-hanging fruit routes frequently employed by cyber attackers in Kenya.

    1. Social Engineering: It’s becoming more expensive for hackers to penetrate software. By contrast, it’s easier and less costly to trick a user into clicking a malicious link or opening a phishing email. The best defense against phishing is employee education and training.
    1. Poorly secured cloud apps: Recent Microsoft research suggests that 79 percent of Software-as-a-Service (SaaS) storage apps and 86 percent of collaboration apps do not encrypt data both at rest and in transit. When adopting cloud apps, you should make sure that only apps with web session protection and encryption are allowed. OOrganizationsshould also have a solution in place to have visibility into and control over all cloud apps usage.
    1. Taking advantage of legitimate platform features: Cybercriminals are increasingly taking advantage of legitimate software platform features to infect computers. For example, during the last quarter of 2017, the Windows Defender Security Intelligence team detected incidents where hackers used legitimate business software to stay “under the radar” as they phished users and infected computers.

    Wrestling ransomware

    Last year the infamous ransomware attack WannaCrypt hit the NHS and other systems around the world, bringing down critical services. It impacted over 230,000 computers and to this day constitutes one of the largest ever cyber-attacks. According to Microsoft’s latest Security Intelligence Report, ransomware continues to be a popular method used by cybercriminals to solicit money from victims.

    At least 19 companies in Kenya were been hit by the WannaCrypt attack.

    To protect yourself from falling victim to a ransomware attack you can take the following measures:

    1. Back up data: Be sure to create destruction-resistant backups of critical systems and data. Also, be sure to regularly test that backups are working.
    1. Apply multi-layered security defences: Use an email security solution that scans suspicious email attachments and ideally protects at the time a user clicks on an attachment. Antivirus software should help detect and block the download and installation of some ransomware but to mitigate against the impact of sophisticated ransomware, additional protection is required. Advanced threat protection that applies machine learning and artificial intelligence technologies can help.
    1. Keep software up-to-date: To minimise entry points for ransomware, be sure to keep all software updated, including operating systems, web browsers, plug-ins and security software. Also prioritise patching new releases to enable stronger protection against vulnerabilities.

    Prevention is better than cure

    The past year has shown us the significant impact of botnet infections on computers worldwide. We’ve seen cybercriminals leveraging less sophisticated methods to infect machines and extort ransoms from victims; and we’ve continued to encounter ransomware in a wide range of cybercrime activity.

    Organisations in Kenya that act quickly to adopt security solutions, implement incident response plans and employ the right mix of people will minimise damage and impact from cyber-attacks now and in the future.

    Microsoft is a trusted security advisor and partner to large global organisations. To learn more about our security offerings, visit www.microsoft.com/security and check out the Microsoft Security Blog for our perspectives on additional trending threats and topics.

    cyber security Microsoft
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Tether Makes Strategic investment in Kenya’s Kotani Pay

    October 25, 2025

    Standard Chartered Uganda to Sell Wealth and Retail Banking Business to Absa Bank Uganda

    October 24, 2025

    Kenya’s Elly Savatia Wins 2025 Africa Prize for Engineering Innovation with AI Sign Language App, Terp 360

    October 24, 2025

    Comments are closed.

    Latest Posts

    Tether Makes Strategic investment in Kenya’s Kotani Pay

    October 25, 2025

    Vertiv and NVIDIA Power the Next Generation of AI Factories

    October 24, 2025

    Standard Chartered Uganda to Sell Wealth and Retail Banking Business to Absa Bank Uganda

    October 24, 2025

    Kenya’s Elly Savatia Wins 2025 Africa Prize for Engineering Innovation with AI Sign Language App, Terp 360

    October 24, 2025
    Advertisement
    Editor's Pick

    Why attack surface management must look both inside and out

    October 22, 2025

    T-Bin: The Kenyan Startup Using Smart Bins to Revolutionize Waste Management in Africa

    October 21, 2025

    M-KOPA’s Financing Model is Powering Kenya’s Electric Mobility Transition: A Conversation with Brian Njao

    October 21, 2025

    Funder Wants to Be Kenya’s Digital Meeting Ground for Startups and Investors

    October 21, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.