Kenya
Kenya Cyber
CyberSecurity
Security
Report
Report
2015
2015
Top Attacked Ports
46%
Port 5060 (SIP)
Most targeted port
by attackers
The port statistics show that
at forty six percent (46%) port
5060 (SIP) was the most targeted
port by attackers emphasizing
the need to secure VoIP and IP
Telephony solutions.
Cybersecurity Perspective from the Legal
Advisory Sector
Anne Kinyanjui | Partner, Iseme, Kamau and Maema Advocates
C
yber-attacks are a threat to all businesses today and law
information as well as
firms are progressively becoming attractive targets to
enforcement mechanisms
such attacks, particularly since they have confidential
to enforce such policies.
client information that could be of significant value to third
parties. A law firm’s reputation is perhaps its most valuable
asset and clients expect all transactions and communication to
be kept confidential. Maintaining this reputation in an era of
increased cybersecurity breaches is critical, hence the need for
firms to define the security controls required in order to mitigate
against cyber-attacks. As the New York Times reported in 2014,
“a growing number of big corporate clients are demanding
Cybersecurity breaches
take place at multiple penetration points. Some non-technical
issues that need to be looked at as starting points include
portable devices (BYOD) policies, desktop & workstation security,
poor password protection, lack of encryption, employees lacking
security awareness and weak controls & protocols for access to
data (including remote access).
that their law firms take more steps to guard against online
These risks can be mitigated in by building visibility around
intrusions that could compromise sensitive information as
your data, assessing the risks posed to this data and developing
global concerns about hacker threats mount.”
appropriate security programs that focus on implementing cyber
Multinational corporations in particular, before issuing
security policies and employee training and awareness.
instructions, are requesting firms for information about their
These steps and others can help local law firms address their
cybersecurity awareness, security protocols as well as the policies
cybersecurity risks not just for maintaining their reputation and
they have in place to safeguard client information. It is therefore
retaining client confidence but also as a key value proposition to
important for firms to go beyond the traditional reactive mode
differentiate themselves in the market place.
and now become proactive in developing polices to protect
38