A Kenyan official on Wednesday called on Kenyan cyberspace innovators to embrace the concept of Chinese inventiveness to help come up with products suitable for the local market.
Ababu Namwamba, chief administrative secretary in the ministry of foreign affairs, said Chinese innovators create products that are suitable to the local consumers.
“I was in Beijing recently and I was impressed with WeChat, an app that the Chinese use for messaging, social media and mobile payment and which was designed by local developers,” Namwamba said during a cybersecurity forum in Nairobi.
The meeting was organized by ESET, a global cybersecurity company to educate, inform and empower government agencies with information on how they can move from cybersecurity to cyber resilience by understanding the risks they encounter, and incorporating incidence response to their day to day operations.
Karen Cherry, CEO of ESET East Africa, said there was need to make cybersecurity an attractive career for the youth to equip them well with technology security skills.
“In Kenya, over 50 million attacks were recorded between January and June this year and the government needs to do something,” Cherry said.
Bright Gameli Mawudor, brand ambassador for ESET, emphasized on the need to adhere to policies and strategies in regard to cybersecurity in order to acquire resilience and control.
Mawudor said that mobile applications and business emails are easily compromised by hackers online including regional governments as well as small and medium enterprises (SMEs).
“Lack of simple code encryption is an issue that causes information to be easily compromised online. It is necessary to start from basics such as going for a multi-layered approach that includes monitoring and being proactive,” he said.
The expert highlighted the practical scenarios on online security threats and how to prevent and diminish such dangers, as he informed the participants how Kenya’s financial institutions lose between 12,000 shillings (120 U.S. dollars) and 200 dollars per minute to hackers.
He demonstrated how hackers easily carry out their mischievous yet risky practices that mess up organizations’ data. Enditem