Informations Systems Consultant


With the knowledge age here with us, information is available almost on every channel on the internet. ICT infrastructure development all over the world, in countries and in organizations have seen to this. Truly communication has been made easier, no longer cost prohibitive and more convenient. This has seen the creation of hot spots in many public places; airports, restaurants, hospitals, institutions of learning and many other business areas.

Now we can easily access almost anything we require on the internet. We can remotely do what we  once considered  mundane tasks like banking services among others. We can share with the one another and the world at large through our social sites.

Our concern then should be the risk that comes with this exposure. Our information is all over the internet. From our social sites profiles, emails and so much more. How do we safeguard ourselves? The complexity of cyber crime has it that fraudsters and criminals steal identities and start monitoring would be victims for days even years. Then when they do pounce on you, they have such accuracy on who we are, where we live, where we work, how much we earn, our family, our investments, achievements and just say almost everything.

Already Politicians and other big wigs have already tasted this by facing blackmails for their extra-marital affairs among other exposed info to fraudsters.

Information is power and to have it means being able to do extraordinary things. Making money illegally being the alluring factor to hackers.

The risk cannot be fully insured but prudent measures heavily reduce their occurence like having:

  • dedicated email addresses that offer encryption,
  • not offering all info to non-secure sources on the internet,
  • being discrete on all platforms,
  • questioning even the obvious of inquiries,
  • professional configuration on our PCs and Laptops,
  • setting up your browser with security controls
  • having a robust internet anti-virus
  • encrypting information on your machine
  • shredding paperwork

the list is endless.

For organizations, procuring professional consultants to assess the risk is the first step. Then engage your ICT team with the consultants to formulate a formidable IT strategy in policy form, hardware configuration as well as possible software solutions including firewalls and physical protection details.

The statistics from developed countries on the price they had to pay for their ignorance on this is worthy paying attention to. Already we have seen what a few rogue individuals have done to our sleeping banks on unauthorized ATM withdrawals, transfers and all. It calls on us then to be on high alert.

Cyber Crime is here with us and we cannot let Kenya and the East Africa Region be a statistic.

Information Security Consultants in Kenya include:

  • Teqlink Solutions
  • BT Consulting
  • John Gichuki
  • Maskil Co. Ltd

And others.

Further Inquiries are welcome.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Tag Cloud

%d bloggers like this: