Technology Computer & Networking security

Kenyan Websites Under Attack from Hackers. Information Security Experts May Improve Website Security

Over the last two Kenya made major strides in its efforts to expand internet connectivity in the country by gaining access to fibre optic cable. A few months ago, Kenya received its fourth fibre optic cable after an agreement between France Telecom-Orange and some members of Lower Indian Ocean network to extend submarine cable to Mombasa, a coastal town of the country. While the arrival of the fibre optic cable has increased the visibility of Kenyan business organizations, it has also made them vulnerable to hacking and data breaches. In the recent months, Kenya has repeatedly faced attacks on websites of government ministries, bodies and business organizations.

Cyber-attacks pose a threat to information security as hackers can gain access to the privileged databases associated with the government and business websites. Some of the websites, which have been attacked or defaced in the recent months, include the website of the ministry of finance, Kenya police website, website of Kenya administrative police, the website of the Kenyan government and the website of a major mobile company. The police website has records related to absconding criminals, key police officials and other significant public documents.

Government and business organizations in Kenya do not have adequate IT security measures in place to prevent successful hacking attacks. Investment in IT security infrastructure is crucial for government and business organizations to ensure data protection and derive the full benefits of Internet technology. Regular assessment of IT security infrastructure through vulnerability assessment tests, ethical hacking and security audits is crucial to detect the security flaws and initiate corrective measures.

Government and industry associations may organize seminars and workshops to create information security awareness among bureaucrats and employees. Seminars and training programs may help individuals in understanding the dominant threats in the Internet environment and inculcate safe computing practices.

Kenya faces shortage of Information security professionals who can strengthen the defenses of on government bodies and business organizations against hacking attempts, intrusions and other sophisticated attacks by cybercriminals. Government authorities, schools, Universities and industry associations can collaborate to meet the future requirements of the IT workforce by introducing job-oriented security certification programs.
SHARE
RELATED POSTS on "Technology"
Use Online Backup to Keep Your Valuable Data Safe
Use Online Backup to Keep Your Valuable Data Safe
'Problem occurred while doing OST sync operation' Error and Recovery
'Problem occurred while doing OST sync operation' Error and Recovery
Data Recovery - Important Factors to Consider
Data Recovery - Important Factors to Consider
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Speed Up XP Software - Download Right Now!
Speed Up XP Software - Download Right Now!
The Right Time To Use A Registry Cleaner Windows XP Optimizer
The Right Time To Use A Registry Cleaner Windows XP Optimizer
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
How to Get Rid of Spyware on My Computer
How to Get Rid of Spyware on My Computer
How to Avoid a Malware Infection?
How to Avoid a Malware Infection?
Outstanding Registry Cleaner
Outstanding Registry Cleaner
Why You Should Be Using Vipre Internet Security?
Why You Should Be Using Vipre Internet Security?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
How to Remove Virus Protector Spyware Automatically-Manually
How to Remove Virus Protector Spyware Automatically-Manually
Data Recovery of IBM Drive
Data Recovery of IBM Drive
What Are the Best Registry Cleaners For Windows?
What Are the Best Registry Cleaners For Windows?
Protect Your Laptop and the Data It Holds
Protect Your Laptop and the Data It Holds

Leave Your Reply

*