Skip to main content

The Threat Landscape: What’s Actually Targeting Kenyan Businesses

Kenyan businesses face a unique cybersecurity environment where international cybercrime tactics intersect with local vulnerabilities. The perception that “we’re too small to be targeted” has led to devastating consequences: Kenyan SMEs lost an estimated KES 5.2 billion to cybercrime in 2023 alone, with 65% of attacks targeting businesses with under 50 employees.

Four most common threats right now:

1. M-Pesa Phishing & SIM Swap Fraud
Attackers send convincing SMS messages pretending to be Safaricom, asking users to “confirm their M-Pesa PIN” or “update their details.” Once credentials are captured, funds are drained within minutes. SIM swap attacks bypass two-factor authentication entirely.

Recent example: A Nairobi-based supplier lost KES 780,000 when an attacker socially engineered a SIM swap, then accessed their mobile banking.

2. Business Email Compromise (BEC)
Cybercriminals study company communication patterns, then impersonate executives or suppliers to request urgent payments. These attacks work because they exploit existing trust relationships and Kenyan business culture of quick, verbal confirmations.

Local twist: Attackers often strike on Friday afternoons when urgency is highest and verification is difficult.

3. Ransomware Targeting Local Software
Outdated versions of common Kenyan business software (like Pastel, QuickBooks Local) contain unpatched vulnerabilities. Ransomware gangs now specifically target these applications, knowing businesses can’t afford downtime.

Critical vulnerability: Many local accounting packages still use default admin credentials that are never changed.

4. Insider Threats – Often Unintentional
Employees using personal devices for work, sharing passwords for “convenience,” or downloading pirated software create backdoors. The problem isn’t malice—it’s lack of awareness about how everyday actions create security gaps.

Most risky behavior: Using the same password for Facebook, email, and company systems.


Practical, Affordable Protection Strategies

Level 1: Essential Protection (Under KES 2,000/month)

For businesses with 1-10 employees

1. Email Security Basics

  • Enable free multi-factor authentication on all email accounts
  • Implement email filtering (Zoho Mail, Google Workspace include basic protection)
  • Train staff to recognize phishing attempts with weekly test emails

2. M-Pesa Transaction Limits

  • Set daily transfer limits based on actual business needs
  • Enable transaction notifications for all transfers
  • Require dual approval for payments over KES 50,000

3. Device Management

  • Install free antivirus (Bitdefender, Avast Business Free)
  • Enable device encryption on all laptops and phones
  • Implement mandatory screen locks after 2 minutes of inactivity

4. Backup Strategy

  • Automated daily backups to external drive + cloud (Google Drive, OneDrive)
  • Monthly test restores to verify backup integrity
  • Physical backup kept offsite (owner’s home)

Level 2: Enhanced Protection (KES 2,000-5,000/month)

For businesses with 10-25 employees or handling sensitive data

1. Network Security

  • Business-grade router with firewall (MikroTik hEX ~KES 8,000 one-time)
  • Separate guest WiFi for customers/visitors
  • Regular vulnerability scans using free tools (OpenVAS)

2. Access Control

  • Role-based permissions for all systems
  • Password manager implementation (Bitwarden Business ~KES 400/user/month)
  • Regular access reviews (quarterly)

3. Security Monitoring

  • Centralized logging of all critical systems
  • Weekly security report reviews
  • Incident response plan documented and tested annually

4. Compliance Foundations

  • Basic data inventory (what personal data you collect/store)
  • Privacy policy aligned with Data Protection Act 2019
  • Vendor security assessments for key suppliers

Level 3: Advanced Protection (KES 5,000-10,000/month)

For businesses with 25+ employees, e-commerce, or financial data

1. Advanced Threat Detection

  • Endpoint Detection and Response (EDR) solutions
  • Security Operations Center (SOC) monitoring services
  • Regular penetration testing (annual)

2. Data Protection

  • Encryption for data at rest and in transit
  • Data loss prevention (DLP) for sensitive information
  • Secure disposal procedures for old devices

3. Business Continuity

  • Hot site or cloud failover capability
  • Cyber insurance (premiums ~KES 15,000-30,000 annually)
  • Documented disaster recovery procedures

The Human Factor: Training That Actually Works in Kenyan Context

Cultural considerations for effective training:

  • Use local examples and case studies
  • Incorporate Swahili where helpful for understanding
  • Relate to personal experiences (everyone knows someone scammed via SMS)
  • Focus on practical “do this now” actions

Monthly 15-minute security sessions:

  • January: Recognizing phishing emails and SMS
  • February: Safe M-Pesa and mobile banking practices
  • March: Password management basics
  • April: Physical security and device protection
  • May: Social engineering awareness
  • June: Data protection responsibilities
  • July: Safe social media use for business
  • August: Working remotely securely
  • September: Incident reporting procedures
  • October: Yearly refresher and test
  • November: Preparing for holiday season threats
  • December: Annual security review

Reward-based compliance:

  • Small bonuses for teams with perfect phishing test records
  • Recognition for employees who report security concerns
  • “Security champion” roles with additional responsibility and compensation

Data Protection Act 2019: What SMEs Actually Need to Do

Common misconception: “The Data Protection Act only applies to big companies.”
Reality: All businesses processing personal data must comply. Fines for SMEs can reach KES 5 million.

Practical compliance steps:

1. Registration (If Required)

  • Check if you need to register with the Data Commissioner
  • Most SMEs handling employee data only need basic compliance

2. Foundational Requirements

  • Privacy notice: Simple document explaining what data you collect and why
  • Data inventory: Basic spreadsheet of personal data you process
  • Security measures: Document what you’re doing to protect data
  • Data retention policy: Define how long you keep different types of data

3. Data Subject Rights

  • Process for handling access requests within 21 days
  • Procedure for correcting inaccurate data
  • Method for deleting data when no longer needed

4. Third-Party Management

  • Basic agreements with vendors who handle your data
  • Due diligence on cloud providers’ security practices
  • Monitoring of service providers’ compliance

Free resources:

  • Office of the Data Protection Commissioner template documents
  • KEPSA SME compliance guides
  • KICT Authority workshops and checklists

Incident Response: What to Do When Breached

Step 1: Immediate Containment (First 30 Minutes)

  • Disconnect affected systems from network
  • Change all passwords (start with email and banking)
  • Contact mobile provider if SIM swap suspected
  • Notify key personnel via phone (not email)

Step 2: Assessment & Documentation (First 4 Hours)

  • Determine what was accessed/stolen
  • Document everything with timestamps
  • Preserve evidence (don’t turn off affected devices)
  • Engage technical help if needed

Step 3: Notification & Recovery (First 24 Hours)

  • Notify affected individuals if personal data compromised
  • Report to authorities if required (financial crimes to DCI Cybercrime Unit)
  • Begin recovery from clean backups
  • Communicate with stakeholders (customers, suppliers)

Step 4: Post-Incident Review (Within 7 Days)

  • Analyze what happened and why
  • Identify security gaps to address
  • Update policies and procedures
  • Additional staff training on lessons learned

Industry-Specific Considerations

For Retail/E-commerce:

  • PCI DSS basics for payment card security
  • Customer data protection on online platforms
  • Secure third-party payment gateway integration

For Professional Services:

  • Client confidentiality and attorney-client privilege
  • Secure document sharing and storage
  • Encrypted communications for sensitive matters

For Healthcare Providers:

  • Patient data protection requirements
  • Secure telemedicine platforms
  • Compliance with Ministry of Health guidelines

For Educational Institutions:

  • Student data protection
  • Safe online learning environments
  • Parent communication security

Building a Security Culture: Kenyan Business Context

Leadership actions that matter:

  • CEO discusses security in monthly meetings
  • Security budget included in annual planning
  • Recognition for security-conscious behavior
  • Transparency about security incidents and lessons learned

Practical awareness indicators:

  • Employees question unexpected requests
  • Clean desk policies followed
  • Devices secured when not in use
  • Passwords not shared or written down

Measuring security culture:

  • Annual employee security survey
  • Phishing test success rates
  • Security incident reporting frequency
  • Time to detect and contain incidents

Getting Started: 30-Day Action Plan

Week 1: Foundation

  • Enable multi-factor authentication on all email accounts
  • Set M-Pesa transaction limits
  • Install antivirus on all devices
  • Schedule first staff security training

Week 2: Protection

  • Implement weekly backups with test restore
  • Create basic password policy
  • Separate guest WiFi if not already done
  • Document asset inventory

Week 3: Awareness

  • Conduct first phishing test
  • Review Data Protection Act requirements
  • Create incident response contact list
  • Establish security champion role

Week 4: Improvement

  • Review security measures implemented
  • Plan next month’s security training
  • Schedule quarterly security review
  • Document lessons learned

When to Seek Professional Help

Consider engaging cybersecurity professionals when:

  • Handling sensitive financial or personal data
  • Operating e-commerce platforms
  • Experiencing repeated security incidents
  • Required by clients or regulations
  • Lacking internal technical expertise

Red flags with service providers:

  • Promises “100% protection”
  • Doesn’t understand local context and threats
  • No Kenyan clients or references
  • Unwilling to explain things in understandable terms

Questions to ask potential providers:

  • “Can you show me examples of protecting similar Kenyan businesses?”
  • “How do you stay current on local threats?”
  • “What’s included in your incident response support?”
  • “Can you provide Swahili-language training materials?”
Close Menu

About Innowiz

Gateway Mall
1st Floor
Room 23
Mombasa Rd, Nairobi

T: +254719453783
E: info@innowizsolutions.com