Kenya Cyber Security Report 2015

Three years of increased cybersecurity
research, analytics and awareness.....
and counting...
In 2012, we published the first edition of the Kenya Cyber

and are offered as

Security Report. Three years later, the report’s content and

a service.

format has evolved but our primary objective remains the
same: to provide local industries with a comprehensive

In view of

view of the ever-changing cyber security threat landscape

this changing

and enable them to make informed information risk

environment,

management decisions. In 2012, cyber criminals were

there is a need for

opportunistic in nature, but over time have become more

organisations to

skilled, focused and targeted in their attacks.

spend more time
understanding

In 2012, many organisations were focused only on what

their operating

security tools they should buy. This traditional approach

environment (ICT

focused on technology and point solutions that were not

infrastructure,

effective. The top 3 methods used by cyber criminals were

People, Partners

key loggers, stealing of passwords and ATM skimming.

and Customers)

In-comparison to 2015, the top 3 were ransomware,

and learning about

database transaction manipulation and social engineering.

cyber criminals who
might target this

Cyber criminals have advanced to such a degree that it

environment.

is almost impossible to detect intrusions without the
use of advanced

Local cyber

continuous

security

monitoring
and detection

methods
used by

cyber
criminals

methods. Their

2012

2015

Ransomware
Database Transaction
Manipulation
Social Engineering

cheaper as their

move to the cloud

professionals
need to refer
concept of situational awareness. “It is said that
if you know your enemies and know yourself,
you will not be imperiled in a hundred battles.”

tools and attack
mechanisms

to provide local
industries with a
comprehensive view
of the ever-changing
cyber security threat
landscape and
enable them to make
informed information
risk management
decisions...

to a quote by Sun Tzu which emphasizes the
Key Loggers
Stealing of Password
ATM Card Skimming

career is even
becoming

...our primary
objective...

Local organisations need to consistently look
at the security, performance and availability of
their critical network assets by enabling security

4

Select target paragraph3