Kenya Cyber Security Report 2015

References
Cloud Computing

Teleworking

https://en.wikipedia.org/wiki/Cloud_computing

http://onlinecareertips.com/2015/04/benefits-and-disadvantages-of-

http://www.itnewsafrica.com/2014/09/cloud-computing-set-for-

teleworking-an-employees-perspective/

massive-growth-in-sa-kenya/

http://www.webopedia.com/TERM/T/teleworking.html

ERP Automation

Internet of Things

http://www.automationmag.com/software/erp/1069-erp-success-

http://www.webopedia.com/TERM/I/internet_of_things.html

mitigating-failure-risks

http://www.kachwanya.com/2015/04/30/interent-of-things-in-kenya/

https://en.wikipedia.org/wiki/Enterprise_resource_planning
NFC
Managed Services

http://www.nearfieldcommunication.org/benefits.html

http://heartlandtechnologies.com/blog/7-advantages-managed-it-

http://www.nearfieldcommunication.org/nfc-security-risks.html

services

http://www.digitaltrends.com/mobile/nfc-explained/

https://en.wikipedia.org/wiki/Managed_services

http://www.nfcworld.com/2014/05/16/329210/safaricom-reportsmerchant-adoption-mobile-money-point-sale/

Mobile and Internet Banking
https://securityintelligence.com/is-nfc-still-a-vulnerable-technology/
http://www.cnbc.com/2015/10/01/kenya-launches-first-mobile-only-makiba-government-bond.html

Cyber Insurance
http://www.computerweekly.com/news/2240202703/An-introduction-

Commercialization of Hacking
to-cyber-liability-insurance-cover
http://blog.brightstores.com/2014/04/18/the-commercialization-ofhttp://www.insurancegateway.co.za/Kenya/PressRoom/ViewPress/
hacking-software/
URL=Cyber+liability+v+Commercial+Crime+Insurance+1#.Vgz0Svmqqko
Regulatory & Compliance requirements
Cyber Security Survey
https://www.perficient.com/Industries/Financial-Services/Regulatoryhttps://www.cyberroad-project.eu/en/project/
Compliance
BYOD

http://www.cert.org/incident-management/national-csirts/national-

https://www.sophos.com/en-us/security-news-trends/security-trends/

csirts.cfm?

byod-risks-rewards/what-byod-means-for-security.aspx

https://www.cvedetails.com/vulnerabilities-by-types.php

http://www.crn.com/slide-shows/security/240157796/top-10-byod-

https://www.giac.org/paper/gsec/317/default-password-threat/100889

risks-facing-the-enterprise.htm/pgno/0/1

50

Select target paragraph3