• Latest
  • All
  • How To
Robert Mugo, CEO ICT Authority and Harry Hare Chairman CIO East Africa

Financial Institutions, Government top Most Compromised by Cyber Security Threats

June 14, 2017
Kajiado's Kora Sub-location and Beyond: Digital Connectivity Ignites Small Town Development

USF Projects Fuels Mushrooming of Small Towns in Kenya

May 20, 2025
Microsoft

BitLocker Boot Loop Chaos? Microsoft Releases Fix After Botched May Update

May 20, 2025
USF's KES 40 Billion Digital Inclusion Plan: KES 12 Billion Shortfall Looms

CA Universal Service Fund New Strategy Faces a KES 12 Billion Funding Gap

May 20, 2025
Tanzania Police X Account

Tanzania Police X Account Hacked Amid Rising Political Tensions

May 20, 2025
DHgate Tablet Cases deals
Perplexity AI

Mozilla Tests Perplexity Search Integration in Latest Browser Update

May 20, 2025
Infinix Note 50 Pro

Infinix Note 50 Pro Launches in Kenya with Folax AI and 90W Charging Support

May 20, 2025
iphone 17 air

iPhone 17 Air Battery Leak Disappoints Despite Ultra-Thin Design

May 19, 2025
Connected Africa Summit

Tupatane Diani: Kenya Gears Up for Connected Africa Summit 2025

May 19, 2025
Google I/O 2025

Google I/O 2025: Android 16, Gemini AI, and the Future of Smart Devices

May 19, 2025
Apple Event

Apple Named World’s Most Valuable Brand in 2025. AI Players Surge in Rankings

May 19, 2025
IR-Equipped AirPods

Next AirPods Will Let You Control Music Without Touching Them

May 20, 2025
BURN Secures $5 Million to Bring Clean Cooking to Kenyan Homes

BURN Secures $5 Million to Bring Clean Cooking to Kenyan Homes

May 17, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Financial Institutions, Government top Most Compromised by Cyber Security Threats

Martin Gicheru by Martin Gicheru
June 14, 2017
in News
Reading Time: 2 mins read
262
0
Robert Mugo, CEO ICT Authority and Harry Hare Chairman CIO East Africa

Robert Mugo, Former CEO ICT Authority and Harry Hare, Chairman CIO East Africa

Robert Mugo, CEO ICT Authority and Harry Hare Chairman CIO East Africa Financial institutions are top among sectors that get most compromised where cyber security is concerned. This was mentioned by the ICT Authority CEO Robert Mugo at the ongoing Africa Security Summit hosted by CIO East Africa in Nairobi. Robert attributed the high risk with the high financial gain that compromising banking and in general, financial institutions present.

Sometime back, ATM card skimming had become a major threat in Kenya and people lost quite chunk of money. The other threats to financial institutions and their clients include credit card details theft online as well as point of sale vulnerabilities. Mobile money is not spared either as we’ve had cases of mobile money accounts being drained of funds while the owners held onto their phones.

The second most compromised entity is the government, and according to Robert the motivation for hacking governments would be either political or financial. With politics it would be to show that the government was not doing as much as they should, while for financial it’s the same as with private sector threats, financial gain. With government it’s a bit complicated since sometimes vendors may have ended contractual agreements, leaving a security hole that can be exploited.

Mr. Mugo noted that in the 2016 Africa cyber-security report, losses were in the region of USD 2 billion in Africa relating to cyber-crime, and Kenya had losses amounting USD 175 million, Tanzania was USD 85 million, Uganda USD 35 million. This is quite significant, and those are only the reported cases, the numbers are definitely much higher if you put the unreported cases to consideration. Most institutions do not report cyber-security attacks.

“So it’s very important that people like CIO organize events such as Africa Security Summit to share what we call best practices, how to prevent these attacks from happening, how to detect when attacks happen and how to respond. What we advocate is a three way approach; prevent, detect and respond. In the event that prevention is not successful, to be able to detect and respond appropriately to these attacks. In the case of the recent Wannacry attacks, it’s basic practices that were avoided by people being affected by the malware,” commented Mugo.

“90 percent of security breaches can be prevented by basic practises that anybody can do, not necessarily requiring cybersecurity expert skillset. 10 percent are breaches by professional criminals that require cybersecurity experts.”

Robert defended the notion that Kenya was a hotbed of cyber-security at a fireside chat with CIO East Africa Chairman Harry Hare. “Kenya is not exactly a hotbed of cyber-crime, it’s just that we adopted technology more,” said ICT Authority CEO Robert Mugo. He added that the Kenya government is looking to spend USD 50 million in the next three years on computer security.

This will start with training in different levels starting with the presidential digital talent program where the government is imparting training which includes cyber-security training to the top 400 ICT graduates and then will give them assignments to implement things they have been trained on. The other level is training ICT professionals within government.

The target for each and every institution in government (ministers and state corporations) is to train at least ten people every year in information security, something that’s in their performance contracts. At the moment the performance contract component for state corporations and ministries is tied to training but in future the targets will start being more complex.

Tags: ICT AuthorityKenya
SendShare147Tweet92
Martin Gicheru

Martin Gicheru

Martin is the Managing Editor at Techweez, passionate about personal tech and telling stories of consumer experiences. Talk to me: [email protected]

Related Posts

Connected Africa Summit

Tupatane Diani: Kenya Gears Up for Connected Africa Summit 2025

May 19, 2025
Kenya Trainees at-the-Baykar-Flight-Training-Center

Kenya Ups Surveillance Capabilities with New Bayraktar TB2 Drones

January 2, 2025
ICT Authority Unblocks Kenyan Blogger Kachwanya After Free Speech Dispute

ICT Authority Unblocks Kenyan Blogger Kachwanya After Free Speech Dispute

November 30, 2024
Image showing suspension of Telegram services in Kenya. Lady holding phone with Telegram app.

Kenya (CA) has ordered the suspension of Telegram services

January 25, 2025
CA-OCSAM

CA Marks October 2024 As Cybersecurity Awareness Month in Kenya

January 25, 2025
tiktok

TikTok Ordered To Submit Compliance Reports in Kenya

April 18, 2024

Latest

Kajiado's Kora Sub-location and Beyond: Digital Connectivity Ignites Small Town Development

USF Projects Fuels Mushrooming of Small Towns in Kenya

May 20, 2025
Microsoft

BitLocker Boot Loop Chaos? Microsoft Releases Fix After Botched May Update

May 20, 2025
USF's KES 40 Billion Digital Inclusion Plan: KES 12 Billion Shortfall Looms

CA Universal Service Fund New Strategy Faces a KES 12 Billion Funding Gap

May 20, 2025
Tanzania Police X Account

Tanzania Police X Account Hacked Amid Rising Political Tensions

May 20, 2025
Perplexity AI

Mozilla Tests Perplexity Search Integration in Latest Browser Update

May 20, 2025
Infinix Note 50 Pro

Infinix Note 50 Pro Launches in Kenya with Folax AI and 90W Charging Support

May 20, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

USF Projects Fuels Mushrooming of Small Towns in Kenya

May 20, 2025

BitLocker Boot Loop Chaos? Microsoft Releases Fix After Botched May Update

May 20, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

iPhone 17 Air Battery Leak Disappoints Despite Ultra-Thin Design

Tupatane Diani: Kenya Gears Up for Connected Africa Summit 2025

Google I/O 2025: Android 16, Gemini AI, and the Future of Smart Devices

Apple Named World’s Most Valuable Brand in 2025. AI Players Surge in Rankings

Next AirPods Will Let You Control Music Without Touching Them

BURN Secures $5 Million to Bring Clean Cooking to Kenyan Homes

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.