Kenya
Kenya Cyber
CyberSecurity
Security
Report
Report
2015
2015

Top Attacked Ports

46%
Port 5060 (SIP)

Most targeted port
by attackers

The port statistics show that
at forty six percent (46%) port
5060 (SIP) was the most targeted
port by attackers emphasizing
the need to secure VoIP and IP
Telephony solutions.

Cybersecurity Perspective from the Legal
Advisory Sector
Anne Kinyanjui | Partner, Iseme, Kamau and Maema Advocates

C

yber-attacks are a threat to all businesses today and law

information as well as

firms are progressively becoming attractive targets to

enforcement mechanisms

such attacks, particularly since they have confidential

to enforce such policies.

client information that could be of significant value to third
parties. A law firm’s reputation is perhaps its most valuable
asset and clients expect all transactions and communication to
be kept confidential. Maintaining this reputation in an era of
increased cybersecurity breaches is critical, hence the need for
firms to define the security controls required in order to mitigate
against cyber-attacks. As the New York Times reported in 2014,
“a growing number of big corporate clients are demanding

Cybersecurity breaches
take place at multiple penetration points. Some non-technical
issues that need to be looked at as starting points include
portable devices (BYOD) policies, desktop & workstation security,
poor password protection, lack of encryption, employees lacking
security awareness and weak controls & protocols for access to
data (including remote access).

that their law firms take more steps to guard against online

These risks can be mitigated in by building visibility around

intrusions that could compromise sensitive information as

your data, assessing the risks posed to this data and developing

global concerns about hacker threats mount.”

appropriate security programs that focus on implementing cyber

Multinational corporations in particular, before issuing

security policies and employee training and awareness.

instructions, are requesting firms for information about their

These steps and others can help local law firms address their

cybersecurity awareness, security protocols as well as the policies

cybersecurity risks not just for maintaining their reputation and

they have in place to safeguard client information. It is therefore

retaining client confidence but also as a key value proposition to

important for firms to go beyond the traditional reactive mode

differentiate themselves in the market place.

and now become proactive in developing polices to protect

38

Select target paragraph3