Author - Sentinel Africa

dpa

DATA PROTECTION 101

Data protection can be defined as the mechanism of safeguarding personal data and entails protections granted with respect to collection, processing, dissemination and use of the data. The Data Protection Act (the Act) came into force on the 8th of November 2019 and is currently in the implementation phase. The Act defines what constitutes personal data, as well as outlines the rights and obligations of parties involved in the processing of personal data, including the data subject, data controller...

Read more...
Cyber Security

ESSENTIAL TIPS FOR PERSONAL CYBERSECURITY

With the heightened Cybercrime what are the essential tips for personal cybersecurity? Do you recall how our greatest concern was that our computer would become infected with a virus? Now fast forward ten years, and it is the least of our worries. Today, there are trillions of cybercriminals with the ability to bring entire sectors to a halt. Because a lot of vital information is stored online, fraudsters can do a lot of damage. And that is the case. That isn't...

Read more...
DPA

DATA PROTECTION ACT (2019) COMPLIANCE CHECKLIST

Data protection and privacy is typically applied to personal health information (PHI) and personally identifiable information (PII). It plays a vital role in business operations, development, and finances. By protecting data, companies can prevent data breaches, damage to reputation, and can better meet regulatory requirements. Have you taken the necessary measures to comply with the GDPR? Below is a documented summary of the compliance checklist to the Kenya Data Protection Act 2019 that can give you an initial assessment of where you...

Read more...
DPA

DATA PROTECTION OFFICER APPOINTMENT IN KENYA

The emergence of data-oriented business models has raised the bar significantly in terms of handling and processing customer data. The personal data that individuals provide to businesses are processed to enhance processes and determine revenue models. Business entities and other bodies that process personal data are governed by the Kenya Data Protection Act, 2019(henceforth DPA). The Data Protection Act of Kenya (DPA) is the main national legislation that regulates the processing of personal data in Kenya and categorizes processing...

Read more...
Network Sec.

NETWORK SECURITY TOOLS AND TECHNIQUES

A network security is any activity designed to protect the usability and integrity of your network and data. It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. It is not always the number of Information Security solutions we own that dictates the network safety, rather the different layers of defenses created through adequate configuration and implementation of these solutions that matters. Developing a mature...

Read more...
VAPT

VULNERABILITY ASSESSMENT & PENETRATION TESTING AS A CYBER DEFENSE TECHNOLOGY

Cyber-attacks and threats are a real-world problem today with thousands of networks and websites and being compromised every day. Most of the time you cannot defend against an unknown enemy because these attacks leverage on anything. Attacks mostly exploit a flaw in the system, the flaw is either a result of human error or flaw in the source code during software development. Typically, the anatomy of a cyber-attack is an attacker leveraging a flaw to gain access. A flaw...

Read more...

Same Zero Days, New Target: Chrome

If you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update it immediately to the latest version Google released June 9th. The internet services company has rolled out an urgent update to the browser to address 14 newly discovered security issues, including a zero-day flaw that it says is being actively exploited in the wild. Tracked as CVE-2021-30551, the vulnerability stems from a type confusion issue in its V8 open-source and JavaScript engine. At the Sentinel Cybershield SOC,...

Read more...

Implementation of Data Protection & Data Privacy Regulations

As more and more social and economic activities have place online, the importance of data privacy and data protection is increasingly recognized. Data Privacy or Information privacy is a part of the data protection area that deals with the proper handling of data focusing on compliance with data protection regulations. Data Privacy is centered around how data should be collected, stored, managed, and shared with any third parties, as well as compliance with the applicable privacy laws  Privacy laws are relevant today than ever before, with questions...

Read more...

The Future of Internal Audit; Empowering the Third Line

As part of our interactions for Internal Audit Awareness month, we ran this webinar on the future of internal audit. The third line of defense provides assurance to senior management and the board that the first and second lines’ efforts are consistent with expectations.  Our panelists included; Rodah Owako - Sentinel Africa Rodney Hood Adriko - Centenary Bank Rosalind Muriithi - IIA Kenya

Read more...

Common Cybersecurity Trends to Look out for in 2021

There is no question organizations are still reeling from the massive work-from-home shift that forced them to rethink cybersecurity and placed new dependencies on technologies such as cloud services and digital collaborative tools such as Zoom, Skype and Slack. Those 2020 trends will have a lasting impact. In fact, some organizations announced that majority of their workforce would continue working from home in the coming year. Endpoint Security Therefore, in 2021, home is where the attacks will happen. This will subsequently...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry