Kenya Cyber Security Report 2015
References
Cloud Computing
Teleworking
https://en.wikipedia.org/wiki/Cloud_computing
http://onlinecareertips.com/2015/04/benefits-and-disadvantages-of-
http://www.itnewsafrica.com/2014/09/cloud-computing-set-for-
teleworking-an-employees-perspective/
massive-growth-in-sa-kenya/
http://www.webopedia.com/TERM/T/teleworking.html
ERP Automation
Internet of Things
http://www.automationmag.com/software/erp/1069-erp-success-
http://www.webopedia.com/TERM/I/internet_of_things.html
mitigating-failure-risks
http://www.kachwanya.com/2015/04/30/interent-of-things-in-kenya/
https://en.wikipedia.org/wiki/Enterprise_resource_planning
NFC
Managed Services
http://www.nearfieldcommunication.org/benefits.html
http://heartlandtechnologies.com/blog/7-advantages-managed-it-
http://www.nearfieldcommunication.org/nfc-security-risks.html
services
http://www.digitaltrends.com/mobile/nfc-explained/
https://en.wikipedia.org/wiki/Managed_services
http://www.nfcworld.com/2014/05/16/329210/safaricom-reportsmerchant-adoption-mobile-money-point-sale/
Mobile and Internet Banking
https://securityintelligence.com/is-nfc-still-a-vulnerable-technology/
http://www.cnbc.com/2015/10/01/kenya-launches-first-mobile-only-makiba-government-bond.html
Cyber Insurance
http://www.computerweekly.com/news/2240202703/An-introduction-
Commercialization of Hacking
to-cyber-liability-insurance-cover
http://blog.brightstores.com/2014/04/18/the-commercialization-ofhttp://www.insurancegateway.co.za/Kenya/PressRoom/ViewPress/
hacking-software/
URL=Cyber+liability+v+Commercial+Crime+Insurance+1#.Vgz0Svmqqko
Regulatory & Compliance requirements
Cyber Security Survey
https://www.perficient.com/Industries/Financial-Services/Regulatoryhttps://www.cyberroad-project.eu/en/project/
Compliance
BYOD
http://www.cert.org/incident-management/national-csirts/national-
https://www.sophos.com/en-us/security-news-trends/security-trends/
csirts.cfm?
byod-risks-rewards/what-byod-means-for-security.aspx
https://www.cvedetails.com/vulnerabilities-by-types.php
http://www.crn.com/slide-shows/security/240157796/top-10-byod-
https://www.giac.org/paper/gsec/317/default-password-threat/100889
risks-facing-the-enterprise.htm/pgno/0/1
50
Select target paragraph3