The National KE-CIRT/CC

Tel Hotlines: +254-703-042700, +254-730-172700
incidents@ke-cirt.go.ke

Cybersecurity Tips

National KE-CIRT/CC cybersecurity tips describe and offer advice about common security issues for non-technical computer users. The Internet offers so many opportunities to explore, create and collaborate. But it’s important to keep yourself safe and secure, so you can make the most of it. Whether you’re a new Internet user or an expert, the tips and tools here to help you navigate the web safely and securely are simply good to know.

Click on the following latest National KE-CIRT/CC cybersecurity tips for more information:

Adware Antivirus
ATM Skimmers Backdoors
Backing Up and Sync Google Account Baiting
Bank Fraud Benefits and Risks of Free Email Services
Blockchain Bluetooth Security
Browser Password Manager Children And The Internet
Choosing and Protecting Passwords Clickjacking Cyber Scam
Cyber Security General Tip Cyber Security for Travellers
Data Leakage Dealing with Digital Credit Providers
Digital De-cluttering Digital Footprint
Downloads Dropbox Phishing
Dumpster Diving Email Phishing
End to End Encryption Fake News
Flash Drive Security Fraudulent Apps on Google Play Store
How to Identify Fake Websites Google or Facebook Sign-in
How to Stay Safe while Gaming Online Insider Threats
Impersonation Keeping Children Safe Online
Keyloggers Mobile Application Security
Mobile and Online Banking Mobile Calling Fraud
Man In The Middle Malvertising
Money Muling Mobile Apps
Online Anonimity Online Auctions
Online Gambling Addiction Online Gaming
Online Shopping Protection Online Shopping via Social Media
Password Stealers Phishing Scams
Pharming Scams Protecting Your Privacy
Protecting Portable Devices Public Wi-Fi
Ransomware Reporting Facebook Abusive Content
Reporting Instagram Abusive Content Reporting Twitter Abusive Content
Reporting YouTube Abusive Content Responding to Security Notifications
Rogue Software Safe Downloads
Safe Use of Social Networking Sites Safely Dispose of Sensitive or Confidential Documents
Second Hand Devices – Risk Secure Passwords
Securing Your Web Browser Sextortion Scams
Shoulder Surfing Attacks SMiShing (SMS Phishing)
Social Spamming (SMS Phishing) Social Engineering (SMS Phishing)
Spoofing Snap Maps and Location Privacy
Software Updates Stop Cyberbullying
Tailgating Technical Support Scams – Mobile Network Operators
Trade Safe Online Travelling Safely
Two Step Authentication Using Caution with Email Attachments
Using Caution with USB Drives Vishing Attack
VOIP Security Threats What is Spam?
WhatsApp Scams What Unique Risks are Associated with Children?
Why is Cyber Security a Problem? Zero Day Attack
Powered by ITU/IMPACT

UN ITU ITU IMPACT