Kenya Cyber Security Report 2015
Three years of increased cybersecurity
research, analytics and awareness.....
and counting...
In 2012, we published the first edition of the Kenya Cyber
and are offered as
Security Report. Three years later, the report’s content and
a service.
format has evolved but our primary objective remains the
same: to provide local industries with a comprehensive
In view of
view of the ever-changing cyber security threat landscape
this changing
and enable them to make informed information risk
environment,
management decisions. In 2012, cyber criminals were
there is a need for
opportunistic in nature, but over time have become more
organisations to
skilled, focused and targeted in their attacks.
spend more time
understanding
In 2012, many organisations were focused only on what
their operating
security tools they should buy. This traditional approach
environment (ICT
focused on technology and point solutions that were not
infrastructure,
effective. The top 3 methods used by cyber criminals were
People, Partners
key loggers, stealing of passwords and ATM skimming.
and Customers)
In-comparison to 2015, the top 3 were ransomware,
and learning about
database transaction manipulation and social engineering.
cyber criminals who
might target this
Cyber criminals have advanced to such a degree that it
environment.
is almost impossible to detect intrusions without the
use of advanced
Local cyber
continuous
security
monitoring
and detection
methods
used by
cyber
criminals
methods. Their
2012
2015
Ransomware
Database Transaction
Manipulation
Social Engineering
cheaper as their
move to the cloud
professionals
need to refer
concept of situational awareness. “It is said that
if you know your enemies and know yourself,
you will not be imperiled in a hundred battles.”
tools and attack
mechanisms
to provide local
industries with a
comprehensive view
of the ever-changing
cyber security threat
landscape and
enable them to make
informed information
risk management
decisions...
to a quote by Sun Tzu which emphasizes the
Key Loggers
Stealing of Password
ATM Card Skimming
career is even
becoming
...our primary
objective...
Local organisations need to consistently look
at the security, performance and availability of
their critical network assets by enabling security
4