The National KE-CIRT/CC

Tel Hotlines: +254-703-042700, +254-730-172700
incidents@ke-cirt.go.ke

Cybersecurity Tips

National KE-CIRT/CC cybersecurity tips describe and offer advice about common security issues for non-technical computer users. The Internet offers so many opportunities to explore, create and collaborate. But it’s important to keep yourself safe and secure, so you can make the most of it. Whether you’re a new Internet user or an expert, the tips and tools here to help you navigate the web safely and securely are simply good to know.

Click on the following latest National KE-CIRT/CC cybersecurity tips for more information:

>

Adware Android Security
Antivirus ATM Skimmers
Backdoors Backing Up and Sync Google Account
Baiting Bank Fraud
Benefits and Risks of Free Email Services Blockchain
Bluetooth Security Browser Password Manager
Cat Phishing Children And The Internet
Choosing and Protecting Passwords Clickjacking Cyber Scam
Cloud Computing Cyber Security General Tip
Cyber Security for Travellers Data Leakage
Dealing with Digital Credit Providers Digital De-cluttering
Digital Footprint Downloads
Dropbox Phishing Dumpster Diving
Email Phishing End to End Encryption
Fake News Flash Drive Security
Fraudulent Apps on Google Play Store How to Identify Fake Websites
Google or Facebook Sign-in How to Stay Safe while Gaming Online
Insider Threats How to Protect Your iOS Device
Impersonation Keeping Children Safe Online
Keyloggers Mobile Application Security
Mobile and Online Banking Mobile Calling Fraud
Man In The Middle Malvertising
Money Muling Mobile Apps
Online Anonimity Online Auctions
Online Gambling Addiction Online Gaming
Online Shopping Protection Online Shopping via Social Media
Online Charity Scam Operating System
Oversharing Password Stealers
Phishing Scams Pharming Scams
Protecting Your Privacy Protecting Portable Devices
Public Wi-Fi Ransomware
Reporting Facebook Abusive Content Reporting Instagram Abusive Content
Reporting Twitter Abusive Content Reporting YouTube Abusive Content
Responding to Security Notifications Rogue Software
Safe Downloads Safe Use of Social Networking Sites
Safely Dispose of Sensitive or Confidential Documents Second Hand Devices – Risk
Secure Passwords Secure Online Transactions
Securing Your Web Browser Sextortion Scams
Shoulder Surfing Attacks SMiShing (SMS Phishing)
Social Spamming (SMS Phishing) Social Engineering (SMS Phishing)
Spoofing Snap Maps and Location Privacy
Software Updates Stop Cyberbullying
Tailgating Technical Support Scams – Mobile Network Operators
Third Party App Stores Trade Safe Online
Travelling Safely Two Step Authentication
Types of Hackers Uber Safety Tips
Using Caution with Email Attachments Using Caution with USB Drives
Vishing Attack VOIP Security Threats
What is Spam? WhatsApp Scams
What Unique Risks are Associated with Children? Why is Cyber Security a Problem?
Zero Day Attack
Powered by ITU/IMPACT

UN ITU ITU IMPACT