{"id":3041,"date":"2019-06-11T11:13:16","date_gmt":"2019-06-11T11:13:16","guid":{"rendered":"https:\/\/africasustainabilitymatters.com\/?p=3041"},"modified":"2026-01-11T05:30:20","modified_gmt":"2026-01-11T05:30:20","slug":"kenya-africas-cybercrime-preparedness-found-weak","status":"publish","type":"post","link":"https:\/\/rayscohosting.best\/ASM\/2019\/06\/11\/kenya-africas-cybercrime-preparedness-found-weak\/","title":{"rendered":"Kenya, Africa\u2019s Cybercrime Preparedness Found Weak"},"content":{"rendered":"\n<p><em>The East African<\/em><\/p>\n\n\n\n<p>African governments\nare not well equipped to deal with cybercrime attacks increasing their\nvulnerability to loss of data and money through hacking.<\/p>\n\n\n\n<p>According to the\nGlobal Cybersecurity Index (GCI) 2017, African governments need to consider\npolicies that support continued growth in technology sophistication, access and\nsecurity, and adopt national cybersecurity strategies.<\/p>\n\n\n\n<p>There has been\nincreased incidents of hacking of government and corporate systems in Kenya in\nparticular with the latest being last week when 18 government websites were\ntemporarily taken down by hackers.<\/p>\n\n\n\n<p>Earlier in February,\nKenya\u2019s Directorate of Criminal Investigations issued warrants of arrest for\n130 suspected hackers and fraudsters for alleged banking fraud between June\nlast year and January this year and sought the public&#8217;s help in their arrest.\nThe warrants of arrest were issued a day after the Central Bank of Kenya called\non commercial banks to brace for more risks that IT systems pose to their\noperations, reflecting fears of the rising cases of cybercrimes in financial\ninstitutions.<\/p>\n\n\n\n<p>It is argued that last\nweek\u2019s attack on the government websites shows that there are gaps, and if\nKenya, one of Africa\u2019s leading technology markets, is having a hard time, there\nis cause for concern for the rest of the continent.<\/p>\n\n\n\n<p>According to the GCI\nreport, developing countries lack trained cybersecurity experts as well as the\nnecessary know-how on cybersecurity issues for law enforcement, coupled with\nweak legislatures that cannot enact the necessary laws to guide the judiciary.<\/p>\n\n\n\n<p>\u201cThere is a need for\nthe developed world to help train experts in cybersecurity, and more\nco-operation should be initiated between developed and developing countries,\u201d\nthe report says.<\/p>\n\n\n\n<p>GCI is a survey that\nmeasures the commitment of member states to cybersecurity in order to raise\nawareness and help countries identify areas for improvement as well as\nmotivating them to raise their overall level of commitment.<\/p>\n\n\n\n<p>The report ranks\ncountries by their commitment in prevention of cybercrime attacks across five\nkey areas: Legal, technical, organizational, capacity building and\nco-operation. Kenya and a few other countries are ranked moderate on commitment\nlevel. Mauritius is ranked the highest. Kenya is estimated to have just 1,700\nskilled cybersecurity professionals, with 60 per cent of the companies facing a\nshortage.<\/p>\n\n\n\n<p>Read\n<a href=\"https:\/\/www.theeastafrican.co.ke\/news\/ea\/cybercrime-preparedness\/4552908-5149590-uw30ur\/index.html\">original\nstory<\/a> on The East African<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The East African African governments are not well equipped to deal with cybercrime attacks increasing their vulnerability to loss of data and money through hacking. According to the Global Cybersecurity&hellip;<\/p>\n","protected":false},"author":3,"featured_media":3042,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","pagelayer_contact_templates":[],"_pagelayer_content":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[101],"tags":[],"class_list":["post-3041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-international-news"],"_links":{"self":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/posts\/3041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/comments?post=3041"}],"version-history":[{"count":0,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/posts\/3041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/media\/3042"}],"wp:attachment":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/media?parent=3041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/categories?post=3041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/tags?post=3041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}