<HTML><HEAD>
<META content="text/html; charset=utf-8" http-equiv=content-type></HEAD>
<BODY dir=ltr>
<DIV dir=ltr>
<DIV style="FONT-SIZE: 10pt; FONT-FAMILY: 'Arial'; COLOR: #000000">
<DIV
style='FONT-SIZE: small; TEXT-DECORATION: none; FONT-FAMILY: "Calibri"; FONT-WEIGHT: normal; COLOR: #000000; FONT-STYLE: normal; DISPLAY: inline'>
<DIV style="FONT: 10pt tahoma">
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri></FONT> </DIV>
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri>Cybercriminals recognize the
possibility for riches in the flow of information that makes the global economy
go round, and they are coming after your data with ever-increasing tenacity. As
you know, </FONT></DIV>
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri></FONT> </DIV>
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri>technological advances have
helped tighten and control many security and privacy risks. However, because
these technologies have improved so much in recent years, cyber attackers have
shifted their</FONT></DIV>
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri></FONT> </DIV>
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri>focus to the ever-vulnerable
human. While you can build a wall of technical protections around systems and
information, it is ultimately the actions and behaviors of your people that will
determine just</FONT></DIV>
<DIV><FONT style="FONT-SIZE: 12pt" face=Calibri></FONT> </DIV>
<DIV><FONT style="FONT-SIZE: 12pt"><FONT face=Calibri>how secure your data, and
ultimately your bottom line, really are. <FONT style="COLOR: #000000"><SPAN
style="FONT-FAMILY: ; COLOR: ; language: en-us; mso-ascii-font-family: 'Source Sans Pro Semibold'; mso-fareast-font-family: 'MS Pゴシック'; mso-bidi-font-family: 'MS PGothic'; mso-color-index: 1; mso-font-kerning: 12.0pt">Changing
user </SPAN><SPAN>behavior represents </SPAN><SPAN>the critical “last mile” of
reducing risks on the prevention</SPAN><SPAN
style="FONT-FAMILY: ; COLOR: ; language: en-us; mso-ascii-font-family: 'Source Sans Pro Semibold'; mso-fareast-font-family: 'MS Pゴシック'; mso-bidi-font-family: 'MS PGothic'; mso-color-index: 1; mso-font-kerning: 12.0pt">
side of the security risk </SPAN><SPAN
style="FONT-FAMILY: ; COLOR: ; language: en-us; mso-ascii-font-family: 'Source Sans Pro Semibold'; mso-fareast-font-family: 'MS Pゴシック'; mso-bidi-font-family: 'MS PGothic'; mso-color-index: 1; mso-font-kerning: 12.0pt">equation.</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT style="FONT-SIZE: 12pt"><FONT face=Calibri><FONT
style="COLOR: #000000"><SPAN
style="FONT-FAMILY: ; COLOR: ; language: en-us; mso-ascii-font-family: 'Source Sans Pro Semibold'; mso-fareast-font-family: 'MS Pゴシック'; mso-bidi-font-family: 'MS PGothic'; mso-color-index: 1; mso-font-kerning: 12.0pt"></SPAN></FONT></FONT></FONT> </DIV>
<DIV><FONT style="COLOR: #000000"><SPAN
style="FONT-FAMILY: ; COLOR: ; language: en-us; mso-ascii-font-family: 'Source Sans Pro Semibold'; mso-fareast-font-family: 'MS Pゴシック'; mso-bidi-font-family: 'MS PGothic'; mso-color-index: 1; mso-font-kerning: 12.0pt"><FONT
size=3 face=Calibri>Please email me on <A
href="mailto:ldinga@managecom.co.ke">ldinga@managecom.co.ke</A> if you need an
effective user security awareness and education to help you successfully protect
your organization and reduce security risk.</FONT></SPAN></FONT></DIV>
<DIV><FONT style="COLOR: #000000" size=3 face=Calibri><SPAN
style="FONT-FAMILY: ; COLOR: ; language: en-us; mso-ascii-font-family: 'Source Sans Pro Semibold'; mso-fareast-font-family: 'MS Pゴシック'; mso-bidi-font-family: 'MS PGothic'; mso-color-index: 1; mso-font-kerning: 12.0pt"></SPAN></FONT> </DIV>
<DIV><SPAN
style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373)"></SPAN><SPAN
style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373)"><B><FONT
face=Calibri><FONT style="FONT-SIZE: 12pt"></FONT></FONT></B></SPAN> </DIV>
<DIV><SPAN
style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373)"><B><FONT
size=3 face=Calibri>Lawrence Dinga, MSc. (InfoSec & Forensics),
CISSP</FONT></B></SPAN></DIV>
<DIV><B><FONT size=3 face=Calibri>Managecom Systems Ltd</FONT></B></DIV>
<DIV
style="FONT-FAMILY: ; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto"><FONT
size=3 face=Calibri><STRONG>+254 721226324/ 0733973999</STRONG></FONT></DIV>
<DIV
style="FONT-FAMILY: ; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto"><FONT
size=3 face=Calibri></FONT> </DIV>
<DIV
style="FONT-FAMILY: ; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto"><FONT
face=Helvetica></FONT> </DIV>
<DIV
style="FONT-FAMILY: ; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto"><FONT
face=Helvetica></FONT> </DIV>
<DIV style="BACKGROUND: #f5f5f5">
<DIV style="font-color: black"><B>From:</B> <A
title=kictanet@lists.kictanet.or.ke
href="mailto:kictanet@lists.kictanet.or.ke">Admin CampusCiti via kictanet</A>
</DIV>
<DIV><B>Sent:</B> Friday, September 29, 2017 5:53 AM</DIV>
<DIV><B>To:</B> <A title=ldinga@managecom.co.ke
href="mailto:ldinga@managecom.co.ke">ldinga@managecom.co.ke</A> </DIV>
<DIV><B>Cc:</B> <A title=info@campusciti.com
href="mailto:info@campusciti.com">Admin CampusCiti</A> </DIV>
<DIV><B>Subject:</B> [kictanet] List of data breaches and cyber attacks in
September – 174 million records leaked – IT Governance Blog</DIV></DIV></DIV>
<DIV> </DIV></DIV>
<DIV
style='FONT-SIZE: small; TEXT-DECORATION: none; FONT-FAMILY: "Calibri"; FONT-WEIGHT: normal; COLOR: #000000; FONT-STYLE: normal; DISPLAY: inline'>
<DIV>
<P
style="BORDER-TOP: 0px; BORDER-RIGHT: 0px; VERTICAL-ALIGN: baseline; BORDER-BOTTOM: 0px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px; PADDING-LEFT: 0px; MARGIN: 0px 0px 20px; BORDER-LEFT: 0px; PADDING-RIGHT: 0px"><SPAN>The
cyber security news has been dominated by just one story all month: Equifax,
which suffered one of the largest reported corporate data breaches in
history.</SPAN></P>
<P
style="BORDER-TOP: 0px; BORDER-RIGHT: 0px; VERTICAL-ALIGN: baseline; BORDER-BOTTOM: 0px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px; PADDING-LEFT: 0px; MARGIN: 0px 0px 20px; BORDER-LEFT: 0px; PADDING-RIGHT: 0px"><SPAN>But,
as always, there were plenty of other data breaches and cyber attacks. Many of
them go unreported, and even those that are reported tend to be swept under the
carpet – until they make this list, that is.</SPAN></P>
<P
style="BORDER-TOP: 0px; BORDER-RIGHT: 0px; VERTICAL-ALIGN: baseline; BORDER-BOTTOM: 0px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px; PADDING-LEFT: 0px; MARGIN: 0px 0px 20px; BORDER-LEFT: 0px; PADDING-RIGHT: 0px"><SPAN>Read
on:-</SPAN></P><A
href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-september-174-million-records-leaked/">https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-september-174-million-records-leaked/</A></DIV>
<DIV> </DIV>
<DIV>Would be interested to have local information. Any one collecting such
data?</DIV>
<DIV>
<DIV> </DIV>
<DIV><SPAN
style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373)"><B>Ali
Hussein</B></SPAN></DIV>
<DIV><B>Hussein & Associates</B></DIV>
<DIV
style="FONT-SIZE: medium; FONT-FAMILY: helvetica; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto">+254
0713 601113 / 0770906375</DIV>
<DIV
style="FONT-SIZE: medium; FONT-FAMILY: helvetica; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto"> </DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt"><SPAN>Twitter:
@AliHKassim</SPAN></P><SPAN></SPAN>
<P style="MARGIN: 0in 0in 0pt"><SPAN>Skype: abu-jomo</SPAN></P>
<P style="MARGIN: 0in 0in 0pt"><SPAN>LinkedIn: <A
href="http://ke.linkedin.com/in/alihkassim"
target=_blank>http://ke.linkedin.com/in/alihkassim</A><A
href="http://ke.linkedin.com/in/alihkassim" target=_blank><SPAN
style="TEXT-DECORATION: none"></SPAN></A></SPAN></P><SPAN></SPAN>
<P style="MARGIN: 0in 0in 0pt"></P><SPAN>Blog: <A
href="http://www.alyhussein.com/"
target=_blank>www.alyhussein.com</A></SPAN><BR></DIV>
<DIV><SPAN
style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469)"><BR></SPAN></DIV>
<DIV>"Discovery consists in seeing what everyone else has seen and thinking what
no one else has thought". ~ Albert Szent-Györgyi</DIV>
<DIV><SPAN
style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.294118); -webkit-composition-fill-color: rgba(175, 192, 227, 0.231373)"><BR></SPAN></DIV>Sent
from my iPad</DIV>
<P>
<HR>
_______________________________________________<BR>kictanet mailing
list<BR>kictanet@lists.kictanet.or.ke<BR>https://lists.kictanet.or.ke/mailman/listinfo/kictanet<BR>Twitter:
http://twitter.com/kictanet<BR>Facebook:
https://www.facebook.com/KICTANet/<BR><BR>Unsubscribe or change your options at
https://lists.kictanet.or.ke/mailman/options/kictanet/ldinga%40managecom.co.ke<BR><BR>The
Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people
and institutions interested and involved in ICT policy and regulation. The
network aims to act as a catalyst for reform in the ICT sector in support of the
national aim of ICT enabled growth and development.<BR><BR>KICTANetiquette :
Adhere to the same standards of acceptable behaviors online that you follow in
real life: respect people's times and bandwidth, share knowledge, don't flame or
abuse or personalize, respect privacy, do not spam, do not market your wares or
qualifications.<BR></DIV></DIV></DIV></BODY></HTML>