• Latest
  • All
  • How To
Robert Mugo, CEO ICT Authority and Harry Hare Chairman CIO East Africa

Financial Institutions, Government top Most Compromised by Cyber Security Threats

June 14, 2017
Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
DHgate Tablet Cases deals
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025
KRA's eTIMS System Targets Fuel Tax Cheats

Fuel Stations Must Now Link to KRA’s eTIMS or Risk Penalties

June 30, 2025
Facebook

New Facebook AI Tool Can Access Private Images on Your Phone

June 30, 2025
Windows 11 25H2

Microsoft Confirms Windows 11 25H2 As the Next Big Upgrade

June 30, 2025
Infinix Hot 60i

Infinix Quietly Launches the Hot 60i in Bangladesh

June 29, 2025
Counterfeit Products Infiltrate Kenya's Online Market

Counterfeit Goods Flood Kenyan Online Shops Like Jumia and Facebook

June 29, 2025
Top 5 Platforms to Sell Bitcoin for Cash Without Stress

Top 5 Platforms to Sell Bitcoin for Cash Without Stress

June 30, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Financial Institutions, Government top Most Compromised by Cyber Security Threats

Martin Gicheru by Martin Gicheru
June 14, 2017
in News
Reading Time: 2 mins read
262
0
Robert Mugo, CEO ICT Authority and Harry Hare Chairman CIO East Africa

Robert Mugo, Former CEO ICT Authority and Harry Hare, Chairman CIO East Africa

Robert Mugo, CEO ICT Authority and Harry Hare Chairman CIO East Africa Financial institutions are top among sectors that get most compromised where cyber security is concerned. This was mentioned by the ICT Authority CEO Robert Mugo at the ongoing Africa Security Summit hosted by CIO East Africa in Nairobi. Robert attributed the high risk with the high financial gain that compromising banking and in general, financial institutions present.

Sometime back, ATM card skimming had become a major threat in Kenya and people lost quite chunk of money. The other threats to financial institutions and their clients include credit card details theft online as well as point of sale vulnerabilities. Mobile money is not spared either as we’ve had cases of mobile money accounts being drained of funds while the owners held onto their phones.

The second most compromised entity is the government, and according to Robert the motivation for hacking governments would be either political or financial. With politics it would be to show that the government was not doing as much as they should, while for financial it’s the same as with private sector threats, financial gain. With government it’s a bit complicated since sometimes vendors may have ended contractual agreements, leaving a security hole that can be exploited.

Mr. Mugo noted that in the 2016 Africa cyber-security report, losses were in the region of USD 2 billion in Africa relating to cyber-crime, and Kenya had losses amounting USD 175 million, Tanzania was USD 85 million, Uganda USD 35 million. This is quite significant, and those are only the reported cases, the numbers are definitely much higher if you put the unreported cases to consideration. Most institutions do not report cyber-security attacks.

“So it’s very important that people like CIO organize events such as Africa Security Summit to share what we call best practices, how to prevent these attacks from happening, how to detect when attacks happen and how to respond. What we advocate is a three way approach; prevent, detect and respond. In the event that prevention is not successful, to be able to detect and respond appropriately to these attacks. In the case of the recent Wannacry attacks, it’s basic practices that were avoided by people being affected by the malware,” commented Mugo.

“90 percent of security breaches can be prevented by basic practises that anybody can do, not necessarily requiring cybersecurity expert skillset. 10 percent are breaches by professional criminals that require cybersecurity experts.”

Robert defended the notion that Kenya was a hotbed of cyber-security at a fireside chat with CIO East Africa Chairman Harry Hare. “Kenya is not exactly a hotbed of cyber-crime, it’s just that we adopted technology more,” said ICT Authority CEO Robert Mugo. He added that the Kenya government is looking to spend USD 50 million in the next three years on computer security.

This will start with training in different levels starting with the presidential digital talent program where the government is imparting training which includes cyber-security training to the top 400 ICT graduates and then will give them assignments to implement things they have been trained on. The other level is training ICT professionals within government.

The target for each and every institution in government (ministers and state corporations) is to train at least ten people every year in information security, something that’s in their performance contracts. At the moment the performance contract component for state corporations and ministries is tied to training but in future the targets will start being more complex.

Tags: ICT AuthorityKenya
SendShare147Tweet92
Martin Gicheru

Martin Gicheru

Martin is the Managing Editor at Techweez, passionate about personal tech and telling stories of consumer experiences. Talk to me: [email protected]

Related Posts

Communications Authority ranked by ITU as best in Africa ICT regulations

Kenya’s ICT Regulation Surpasses US, Crowned Africa’s Best by UN

June 5, 2025
Connected Africa Summit 2025

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

May 27, 2025
Connected Africa Summit

Connected Africa Summit Calls for Unified Tech Vision

May 28, 2025
Connected Africa Summit

Tupatane Diani: Kenya Gears Up for Connected Africa Summit 2025

May 20, 2025
Kenya Trainees at-the-Baykar-Flight-Training-Center

Kenya Ups Surveillance Capabilities with New Bayraktar TB2 Drones

January 2, 2025
ICT Authority Unblocks Kenyan Blogger Kachwanya After Free Speech Dispute

ICT Authority Unblocks Kenyan Blogger Kachwanya After Free Speech Dispute

November 30, 2024

Latest

Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Fuel Stations Must Now Link to KRA’s eTIMS or Risk Penalties

New Facebook AI Tool Can Access Private Images on Your Phone

Microsoft Confirms Windows 11 25H2 As the Next Big Upgrade

Infinix Quietly Launches the Hot 60i in Bangladesh

Counterfeit Goods Flood Kenyan Online Shops Like Jumia and Facebook

Top 5 Platforms to Sell Bitcoin for Cash Without Stress

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.