CONTACTS: +254 726879488 (Mobile)
+254770 455 116 (Office)
Kenya’s Communications Authority (CA) reports that by the end of June 2025, there were 47.7 million active mobile-money subscriptions, corresponding to a mobile-money penetration rate of 91.0% of the population.
The Data Protection Act and its regulations plus Office of the Data Protection Commissioner guidance requires that companies notify of a personal breach within 48 hours of becoming aware of it, and of a notifiable breach within 72 hours.
Fraud, ransomware and data breaches now directly impact liquidity, customer trust and regulatory confidence; these risks make threat intelligence absolutely essential.
Threat intelligence is the structured collection and analysis of information about adversaries, their capabilities, their motivations and their methods. It connects external context to internal risk by answering practical questions like: What fraud campaigns are circulating in the region?
Threat intelligence is the missing link between regulation and resilience. It connects the intelligence with action, informing risk assessments, security investment decisions, and testing.
The author is the Lead Cyber Security Engineer at ESET
Recover your password.
A password will be e-mailed to you.
Last Updated on March 8, 2026 by Steve UMIDHA