• Latest
  • All
  • How To
microsoft digital transformation future workforce

Microsoft Paints the Grave Nature of the Kenyan Cyberspace in New Report

January 28, 2020
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
DHgate Tablet Cases deals
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Infinix GT20 Pro

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

May 6, 2025
Emerald PostPay

Safaricom Transitions Customers to New Emerald PostPay Plans

May 6, 2025
Intrusion Detection System

Android 16 Will Let You Track Suspicious Activity on Your Phone

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Microsoft Paints the Grave Nature of the Kenyan Cyberspace in New Report

Kenn Abuya by Kenn Abuya
January 28, 2020
in Features
Reading Time: 4 mins read
256
0
microsoft digital transformation future workforce

microsoft digital transformation future workforceOver the last several years, there has been a disturbingly high number of cybercrime cases across the globe. Kenya is one of the countries that are affected, and these cyber intrusions continue to influence the economic and strategic growth of the nation – including recent cases where a series of government websites were defaced by cybercriminals.

Reports such as those tabled by a global corporation like Microsoft suggest that cyber-attacks cost the Kenyan economy up to KES 29.8 billion in 2018.

One of the primary reasons the country has created a permissive environment for cyber-attacks is through weak campaigns about the dangers of internet-based crimes and the risk of using cyber services.

While the country prides itself with robust digital infrastructure, some areas are still subject to poor development of digital services. Admittedly, cybercriminals have taken advantage of weak security systems and cyber habits of locals to deploy attacks.

“As organizations continue to pursue a fully digitally transformed future, threats within the cyberspace will continue to become more advanced in not just the financial sector, but in many industries across the region. This will leave individuals and organizations alike with no choice but to turn to the ever-improving capabilities that advanced technologies and solutions bring with it – and this is what encompassed our goal for this event. We are passionate about this and recognize the dire need not only to inform but also enable organizations in this regard,” noted Sebuh Haileleul, Country Manager for Microsoft in Kenya.

The local Microsoft office further reiterates our assertions that we are rooted in the new or 4th industrial revolution. These developments have had their fair share of transitioning the state into a new kind of information age.

Yet, companies’ and peoples’ awareness of, and the enthusiasm for, these changes have been influenced by fears that the online world brings with it new threats and dangers to our internet security and overall well-being.

What is more, the online space, the cornerstone of digitized interactions and exchanges, has demonstrably offered a wide range of opportunities for people and the organizations that serve them – and in the same breath, has continued to fuel opportunities for criminals who have proved their deviation from time to time.

In twenty years or so on from the onset of internet services in widespread digital consciousness, it has become apparent that the intervening years have been centered around fears regarding its criminal dimensions.

Local businesses continue to cite threats to growth and economic performance, especially for cases surrounding e-fraud. The Kenyan government has highlighted the grave nature of cyber warfare, especially in the wake of current events surrounding online terrorism.

Companies continue to fear of their online safety as they are apprised of intruders who are actively pursuing weak points in their systems.

In fact, it is a safe assumption that hardly does any computer user exist who has not been who has not experienced some form of attack, either by forced intrusion or attack by viruses, among other types of malicious software.

Furthermore, it can be argued that activists who defend democratic rights and freedoms have seen cyber threats arise from their surroundings, where they are convinced that the cyberspace furnishes tools for some form of illegal surveillance, where influential people are watching their every move.

Either way, the growth of internet services and products continue to showcase an array of new challenges based on person to person and collective safety and stability, as well as economic prosperity and in some cases, political liberty.

In light of the preceding assertions, Microsoft continues to emphasize its commitment to offering a safer and trusted platform for businesses and organizations in the regions it operates in. During its stakeholder sitting that was staged a couple of days ago, the Redmond-based technology leader echoed its findings published in its Security Intelligence Report that identified four primary trends that have come up during the fight against cyber cases.

“From our ongoing research, we found that in the past year ransomware attacks as a vector declined, software supply chains became a risk, cryptocurrency mining prevalent and that phishing still remains the preferred attack method,” said Sebuh. “While this may indicate progress in blocking ransomware attacks against organizations, it also draws our attention to new avenues now being identified for attacks – otherwise very easily ignored by organizations as a recognizable ‘pathway’ for penetration.”

Perhaps, what Microsoft Kenya is trying to say here besides its statistical projections, such as the reporting that global spending on AI will grow to $46 billion by next year, with 25 percent of this development in banking and security, is that the cloud and AI tools are instrumental in securing setups such as the workplace.

“The use of AI to combat cybersecurity to fill crucial gaps by analyzing a vast ocean of threat data to prevent attacks before they occur is a factor that organizations, through partnering with the correct solutions provider, remains pivotal. Furthermore, the cloud is and still will be imperative to securing the modern workplace. Lastly, quantum computing, although still in its infancy will require threat analysts to keep an eye on what advances in quantum computing would mean for security in 2019 and beyond,” added Sebuh Haileleul during the meet.

Tags: Microsoft
SendShare146Tweet92
Kenn Abuya

Kenn Abuya

Kenn Abuya is a friend of technology, with bias in enterprise and mobile tech. Share your thoughts, tips and hate mail at [email protected]

Related Posts

xbox-series-s

Xbox Prices Jump Worldwide as Microsoft Hikes Costs Across the Board

May 6, 2025
Microsoft hotpatching

Microsoft Introduces Paid Hotpatching to Windows Server 2025

April 28, 2025
windows 11 microsoft

How to Install Windows 11 on an Unsupported Windows 10 PC

April 23, 2025
Microsoft

Microsoft Fires Two Engineers Who Protested AI Deals with Israel

April 8, 2025
Microsoft

Windows 11 Setup Now Requires a Microsoft Account

April 7, 2025
Copilot+

Microsoft Expands Copilot+ AI Features Across AMD, Intel, and Snapdragon Devices

April 7, 2025

Latest

Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

How to Handle Private Number Calls in Kenya

May 8, 2025

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

5 Leading Grant Management Software for Nonprofits

More News

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

Safaricom Transitions Customers to New Emerald PostPay Plans

Android 16 Will Let You Track Suspicious Activity on Your Phone

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.