Magazines (26)

Security in ICT

Kenya sits on a great potential resource, that is the exposure to mobile technology. Nairobi for example is Africa’s most successful ICT hub by growth when compared to south Africa. Mobile phones in this country are almost ubiquitous with a stunning 82% of Kenyans owning a mobile phone. Of this,19% i.e. :8 million Kenyans are estimated to own smartphones with access to mobile applications such as WhatsApp, Facebook and YouTube. Can Mobile Applications once used for chatting posting music and entertainment be used to
solve the serious cases of crime. We at Usalama Technology believe that it is not only possible to do this but it is possible to secure every Kenyan with a mobile phone.”Utumishi kwa wote ” becomes “Usalama kwa Wote”.

Read The Publication

Products and Systems in ICT

ICT (Information Communication Technology) is the technology that facilitates access to information through the use of telecommunications with focus, primarily, on communication technologies. ICT is a blend of Internet, Ethernet and wireless networks, cell phones, and other communication mediums.

An ICT setup is a combination of hardware, software, networked infrastructure and personnel. An effective information system has to be organized, coordinated, controlled, planned and properly secured. This helps to facilitate seamless, effective decision making, and the dissemination of the information in an organization.

Read The Publication

General Business Security

Enterprises that provide financial services, mobile telephony, and utility providers are some of the most vulnerable. Ironically, these firms are some of the major culprits in as far as data vulnerability is concerned. Failure to remove metadata from information published online exposes sensitive information that helps hackers identify locations where a company keeps its files.

Organizations should invest in technology controls to militate against the threat of a cyber attack. The use of metadata stripping tools must be given priority. Regular update of servers connected to the internet must not be overlooked. The only servers accessible via the Internet should be those involved in the production of goods or services. At the same time, organizations should restrict access to these servers.

Read The Publication

Usefulness of CCTV Footage

CCTV cameras are gaining popularity in the country. Once deployed, this amazing technology records goings-on in the area of focus. CCTV cameras have a wide usage in homes, workplaces, shopping malls, town centers and airports. Lately, public transport operators have embraced the technology. However, we are yet to see whether these transport industry players will put CCTV into valuable use.

Once CCTV cameras capture footage, they send it to video recorders. The images can be replayed later whenever the need arises. The stored footage is not a waste and can serve a useful purpose as we shall see in the magazine.

Read The Publication

CCTV Surveillance

In an ambitious effort to make our country safe, the government has lived to its promise; video surveillance cameras have now been installed in Nairobi. In case you haven’t noticed, there are CCTV cameras mounted on poles all over the city and its environs. Walk along Tom Mboya Street, Moi Avenue and you will see grey poles with an assortment of cameras hanging at the top.There are surveillance cameras on Thika Superhighway, Waiyaki Way and Mombasa Road.

In short, the entire city of Nairobi has been placed under video surveillance. What does this imply? It means that Nairobi is now under video surveillance. Going forward, you must be careful what you do; big brother is watching your movements.

Read The Publication

Page 5 of 6