The National KE-CIRT/CC

Tel Hotlines: +254-703-042700, +254-730-172700

Bulletins & Guides

National KE-CIRT/CC cybersecurity tips describe and offer advice about common security issues for non-technical computer users. The Internet offers so many opportunities to explore, create and collaborate. But it’s important to keep yourself safe and secure, so you can make the most of it. Whether you’re a new Internet user or an expert, the tips and tools here to help you navigate the web safely and securely are simply good to know.

Click on the following latest National KE-CIRT/CC cybersecurity tips for more information:

Adware Android Security
Antivirus ATM Skimmers
Backdoors Backing Up and Sync Google Account
Baiting Bank Fraud
Benefits and Risks of Free Email Services Blockchain
Bluetooth Security Browser Password Manager
Cat Phishing Child Secure Internet Applications
Children And The Internet Choosing and Protecting Passwords
Clickjacking Cyber Scam Cloud Computing
Cover Your PC’s Camera When Not in Use Cyber Security General Tip
Cyber Security Tips for Travellers Data Leakage
Data Protection Bill Dealing with Digital Credit Providers
Digital De-cluttering Digital Footprint
Downloads Dropbox Phishing
Dumpster Diving Effective Email Communication
Email Phishing End to End Encryption
Fake News Flash Drive Security
Fraudulent Apps on Google Play Store How to Identify Fake Websites
Google or Facebook Sign-in How to Stay Safe while Gaming Online
Identity Theft on the Internet Insider Threats
How to Protect Your iOS Device How to Stay Safe when Sharing Files
Impersonation Keeping Children Safe Online
Keyloggers Mobile Application Security
Mobile and Online Banking Mobile Calling Fraud
Man In The Middle Malvertising
Money Muling Mobile Apps
Online Anonimity Online Auctions
Online Gambling Addiction Online Gaming
Online Shopping Protection Online Shopping via Social Media
Online Charity Scam Operating System
Oversharing Password Reuse
Password Stealers Phishing Scams
Pharming Scams Protecting Your Privacy
Protecting Portable Devices Protecting Your Children on the Internet
Public Wi-Fi Ransomware
Reporting Facebook Abusive Content Reporting Instagram Abusive Content
Reporting Twitter Abusive Content Reporting YouTube Abusive Content
Responding to Security Notifications Rogue Software
Safe Downloads Safe Use of Social Networking Sites
Safely Dispose of Sensitive or Confidential Documents Second Hand Devices – Risk
Secure Passwords Secure Online Transactions
Securing Your Web Browser Sextortion Scams
Shoulder Surfing Attacks SMiShing (SMS Phishing)
Social Engineering Social Spamming
Spoofing Snap Maps and Location Privacy
Software Updates Stop Cyberbullying
Spware Tailgating
Technical Support Scams – Mobile Network Operators Third Party App Stores
Trade Safe Online Travelling Safely
Two Step Authentication Types of Hackers
Uber Safety Tips Using Caution with Email Attachments
Using Caution with USB Drives Vishing Attack
VOIP Security Threats What is Spam?
WhatsApp Scams What Unique Risks are Associated with Children?
Why is Cyber Security a Problem? Zero Day Attack
Youtube Safety for Kids Debunking Common Cybersecurity Myths
Drive-by Downloads Online Predators
Rogue Security Software Safer Internet Day
Secure Disposal of Mobile Devices Social Media Check-Ins
Social Media Responsibility Webcam Safety
Fake Mobile Apps Online Safety for Children
Deepfakes Identity Theft
Internet Banking Phishing Attacks
Backdoor Attacks Distributed Denial-of-Service (DDoS) Attacks
Public Wi-Fi Staying Safe on Social Networking Sites
Cyber Terrorists Cyberbullying
Disgruntled Insiders End-of-Life Software
Hacktivists Internet Trolls
Mobile Device Security Online Shopping Scamse
Organized Cyber Criminals Peer-to-Peer File Sharing
Script Kiddies Secure Web Browsing
Powered by ITU/IMPACT