22 Nov 2017

Cloud security tools and vendor perspectives

Cloud Security

CLOUD SECURITY TOOLS

Amazon, Google and Microsoft continue to bring out features that reinforce their varying perspectives on public cloud security. Although they still don’t solve one of the biggest threats to cloud workloads.

The so-called Big Three cloud vendors have added a host of features  to help users protect their workloads against threats, with slightly different approaches that highlight their products maturity and their own technological and cultural pedigrees. But one of the biggest obstacles to lock down workloads on these platforms persists: the customers themselves.

Security remains a top priority as enterprises evaluate a move to the public cloud. There are still scenarios where the cloud is unacceptable,particularly at corporations where data residency and other governmental restrictions are paramount. A large security is no longer a reason to reject a move to the cloud. The security practices and staffing behind these platforms are superior to what enterprises have built internally,according to most industry observers.

VENDOR PERSPECTIVE

According toTim Prendergast, CEO and co-founder, Evident.io, “[Cloud] providers are innovating piece by piece, as they learn more about what attackers are doing to compromise workloads.”

THE AMAZON

Amazon has progressed the farthest to improve security. Simply because it was first to market and lacked many of the tools to track and manage resources that are layered on the platform today. Once found mainly in startups, AWS is now a common place at large enterprises. Due to no small part to upgrades of its cloud security tools,in the 11 years since it began selling storage and compute resources.

Over the years,AWS has added identity and access management, configuration rules and other policy controls that have become common practice in the cloud. Many of its latest security upgrades reflect the platform’s maturity,with incremental improvements such as tighter integration with other AWS tools. Now, Amazon’s latest steps aim to protect customers from their own mistakes.  To have more insight on our cloud hosting networks, its a click away.

Share this
20 Apr 2021

Online Grooming

ONLINE GROOMING

Staying safe online.

Online grooming.

Sexual abuse, both in person and online, and exploitation to obtain sexually explicit images and videos of the child are the harm caused.

It can happen quickly or over time, but at its core it’s a process of exploiting trust to shift expectations of what safe behavior is and leveraging fear and shame to keep a child silent.

Grooming is really the start of the sexual abuse/exploitation process, and is a damaging part of the sexual abuse experience.

 

 

Offenders use a multitude of tactics to manipulate children into complying with their requests.

Grooming Tactics

  • Offender falsely identifying themselves online as one of the child’s peers either as a friend or a close relative.
  • They flatter, compliments and support the predator.
  • Promise of a “better” life just to lure them into the trap.
  • Asking questions to see if a child is alone in a room.
  • Promise of gifts, money, cell phones, tablets, drugs, alcohol.
  • Using parents against the child like telling them your parents are too strict, your parents don’t understand you.
  • Telling the child to keep their conversations a secret.
  •  Manipulating children to send photos or blackmailing them with photos the child may have already sent.
  • Exchange of sexual pictures to make victim more comfortable in sending sexual pictures or videos in return.

Actions to take;

Because grooming is often the first stage of sexual abuse, it can create a sense for parents that if they can prevent grooming, they can eliminate the possibility of sexual abuse altogether.

  1. If you see, read, hear anything sexual from an adult towards a child online or in real life, report it.
  2. Empower yourself with knowledge. Learn more about the prevalence of child sexual abuse, how it happens, and how to reduce risk to your child.
  3. Stay up to date on emerging trends and risks online.

Report any case that you may suspect to be exploiting and causing any harm to your child. Always be on the lookout for your Child’s well-being, especially on the internet.

 

Share this
16 Apr 2021

Parental control guidelines on the Internet

Parental controls are the names for a group of settings that put you in control of what content your child can see. They are useful tools to help minimize the risks your children may face, but they are not 100% effective. Combined with privacy settings these can help you protect your children from the things they shouldn’t see or experience online. It’s really important to teach your child skills like critical thinking and resilience, so they know what do if they encounter risk. Always encourage them to talk to you about anything they find upsetting online.

 

Guidelines for Safe Internet Browsing by Age

Kids under 5 years:

Build a white list and choose a handful of sites you’re comfortable with, and plug them into the device your child uses. As he gets older and needs greater access, simply add to the list.

Kids 5 to 8 years:

Use a kid-friendly browser and disable the browser on your child’s device by going to Settings. Replace it with a kid-friendly one that you download from the app store. Choose an app which lets her access only sites it identifies as safe.

For 9 years and up:

Go with Google Safe Search, this search engine does an effective job of filtering explicit images and content. On a computer, go to the preferences section in Google, click “Turn on Safe-search” and then “Lock Safe-search.” On a mobile device, go to Google, click “Settings,” then select “Search settings” and choose “Filter explicit results.” Repeat for each browser.

 

parental guidelines on the internet.

Parenting Kids in the Age of Screens, Social Media and Digital Devices.

How to Set Parental Controls


Android Parental Controls

On these features you can restrict apps, games, movies, and TV your child tries to download from the Google Play Store. In order to limit or track, you need to download the Family Link app, then create a Google account for your child. Continue to select your child’s name and tap the Daily limits card, then select Edit limits and follow the instructions. When time is almost up and the device is about to be locked, the user will get a notification.

 

Amazon Fire Parental Controls

This includes Free Time, this is built into every device. It restricts purchases, bans ads, and allows access only to content you approve. On the limits you can set time restrictions for various activities and prevent the playing of games or videos for a set amount of time.

This parental control is best for kids 8years and under.

Windows 10 Parental Controls

Microsoft family lets you filter websites, block apps, games, and other media on this features. It also regulate your child’s ability to make Microsoft Store purchases.

You can set screen-time limits for individual user sessions. Keep in Mind you’ll have to set up an online Microsoft account and e-mail address for your child.

This is best for kids over 8 year.

Follow us to get more insights on the internet and technology on our blogs, click here.

Share this
24 Mar 2021

PHISHING ATTACK

PHISHING

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or install malware on the victim’s machine.

Three Stages Of a Phishing Attack

Step 1: The Information (Bait)

The first of the three steps of a phishing attack is preparing the bait. This involves finding out details about the target. It can be as simple as knowing that they use a particular service or work at a particular business. If a service leaks a list of just email addresses of its users, criminals will be able to know all the owners of those email addresses. They will use that service and can target them with emails that pretend to be from that service.

In more sophisticated spear phishing attacks, cyber criminals can harvest details from your social media profiles in order to build a highly customized spear phishing message that is highly likely to convince you of its genuineness.

How to identify phishing attacks.

Glance at how your emails can be hacked.

Step 2: The Promise (Hook)

Once the attacker has acquired the necessary information to use as bait, they then need to lay out the hook. To actually make the target perform an action, the attacker needs to promise something or scare them into action.

In many scams the hook involves making the target believe that one of their accounts have been compromised. This creates a sense of urgency and making the target act quickly, perhaps without thinking. The attacker can then redirect the target to follow a link to a page where they can harvest the victim’s details.

Step 3: The Attack (Catch)

The third phase of phishing is the actual attack. The cyber criminal sends out the email, and prepares for the prey to fall for the bait.

What the attacker’s next action will be will depend on the nature of the scam. For example, if they used a landing page to gain the victim’s email password, they can then log in to the victim’s email account in order to harvest more information and start sending further phishing emails to the victim’s contacts.

Ways to Prevent Phishing Attacks

Don’t give your information to an unsecured site

If the URL of the website doesn’t start with “https” do not enter any sensitive information or download files.

Know what a phishing scam looks like

There are many sites online that will keep you informed of the latest phishing attacks and their key identifiers. The earlier you find out about the latest attack methods and share them with your users through regular security awareness training, the more likely you are to avoid a potential attack.

Install firewalls

Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker.

Don’t give out important information unless you must

As a general rule of thumb, unless you 100% trust the site you are on, you should not willingly give out your card information.

Need domains and hosting, Internet connection, Web solutions? Feel free to contact us anytime. Give us a call or drop us an email.

 

Share this
16 Mar 2021

INTERNET LATENCY

INTERNET LATENCY

Latency, also called ping. It measures how much time it takes for your computer, the internet, and everything in between, to respond to an action you take. Like clicking on a link. In other words, it affects how responsive your internet connection, video, or game feels.

Ping is another way of describing latency. The ping is the request you’re sending to the server, and the ping rate is how long it takes for that request to transmit and come back with the result.

It is generally measured in milliseconds (ms) and is unavoidable due to the way networks communicate with each other. It depends on several aspects of a network and can vary if any of them are changed.

Aspects of internet latency.

What causes latency?

  1. Transmission medium:The physical path between the start point and the end point. The type of medium can impact latency. Distance is usually the main cause of latency—in this case, it refers to the distance between your computer and the servers your computer is requesting information from.
  2. Propagation: In physics, propagation is the sending out or spreading of light or sound waves, movement. When we’re talking internet, propagation is the action of sending out your data packets to a server. Theoretically, latency of a packet going on a round trip across the world is 133ms. In actuality, such a round trip takes longer, though latency is decreased when direct connections through network backbone are achieved.
  3. Routers: The efficiency in which routers process incoming data has a direct impact on latency. Router to router hops can increase latency. An old, slow router can bog down your computer’s connection to your internet provider’s modem, whether you use WI-Fi or an Ethernet connection.
  4. Storage delays: Accessing stored data can increase latency as the storage network may take time to process and return information.
  1. Internet connection type: Your internet connection type can also play a role in how high or low your latency is. For the most part, DSL, cable, and fiber internet tend to have lower latency, while satellite internet tends to have higher latency.

 

How do you fix high latency?

  • Turn off any downloads, and be sure to check for anything that’s downloading in the background.
  • Close any unused applications or browser tabs.
  • Use an Ethernet cable to connect your device to your router or modem, if at all possible.
  • Update your router’s and modem’s firmware—outdated firmware can even cause slow internet speeds.
  • Make sure your router settings are solid. Dig in to your modem and router, and make sure none of your settings are creating bottlenecks. Most routers have a settings page where you can change your password, adjust which channel the router is using, and more.Usually the login information is printed right on a sticker on the bottom of the device.
  • Upgrade your internet package. If you’ve upgraded your equipment and tweaked your settings but still aren’t getting the speeds you want, the next step is to upgrade to a faster internet package. Not sure how much speed you need? We’ve got a handy speed recommendation on our packages, check them out.

 

Bandwidth vs. latency

Higher bandwidth is better. Bandwidth is a measure of how much data can be transferred from one point in a network to another within a specific amount of time. When talking about internet connections, it’s usually measuring how much data can be downloaded to your device from a server on the internet.Your actual bandwidth will often be less than your maximum bandwidth because of network congestion and other external factors. If you want to see how fast your internet connection is now, use a speed test.

 

Lower latency is better. It refers to how much time it takes for a signal to travel to its destination and back. To test this, your computer sends a “ping” of information to a remote server and measures how long it takes for the signal to come back.

Lower latency is better because it is essentially a delay between when you take an action and when you see the result—high latency is when it takes longer to see the results. The less delay, the better.

Every time you put in a request to your internet connection, it sends a signal to the server to retrieve the information and then bring it back to you. Since this usually happens pretty quickly, it is measured in milliseconds.

Share this
24 Feb 2021

THE INTERNET AND ITS USAGE.

THE INTERNET.

The internet is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices. The internet provides networking, as it links computers to allow them operate interactively. It is a network of networks that share each other. It is inter-working as it can connect to different networks using intermediary devices. On the internet every device has its own unique IP address. Principles of an IP address:

  • It identifies the host,specifically its network interface
  • It provides the location of the host in the network.

Principles of an IP address is characterized as follows:

  • A name indicates what we seek.
  • An address indicates where it is.
  • A route indicates how to get there.
  • The header of each IP packet contains the IP address of the sending host, and that of the destination host.

PEERING ON THE INTERNET.

Peering is a process by which two internet networks connect and exchange traffic. This allows direct hand of traffic between customers without having to pay a third party to carry that traffic across the Internet for them. This could involve running a circuit across town from one network’s facility to the other’s. Network operators may peer for reasons such as:

  • They have control over their traffic, in that it goes across the Internet via whatever path the transit provider decides to use.
  • It’s cheaper to hand off traffic themselves rather than paying somebody else to do it.
  • It gives greater control over their traffic flows, or allows them to better serve local populations.

 

PEERING

Peering is typically settlements free.

We have two main types of peering, public and private peering.

Public peering, done through an Internet exchange, is more common and more efficient. An Internet exchange is an Ethernet switch in a data center, which all the networks peering in the facility connect to. A network can peer with many other networks through a single connection using an Internet exchange. Peering arrangements needs to be negotiated with each peer, but no new cabling needs to be done.
Private peering within a data center combines the two approaches. Two networks put routers in the same building, and run a direct cable between them rather, than connecting through the exchange point switch. This is most useful when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point. This is sometimes done when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point.

Check out our packages and feel free to contact us here.

 

 

Share this
18 Feb 2021

BENEFITS OF HAVING A WEBSITE.

 

 

Website is a collection of web pages and related content. Its published on one web server and identified by a common domain name. It is a group of World Wide Web pages usually containing hyperlinks to each other and made available online by an individual or company.

BENEFITS.

  1. A great marketing channel.

Having a website you can market your services and products and reach thousands of people. By staying up to date with the latest digital marketing trends you can push your page and climb search engine results.

2. Online Presence 24/7

Having a websites means that your customers are able to find you anytime anywhere. Even when its past working hours, customers can still get to know more about your services. It offers the user convenience as they can access the information they need in the comfort of their own home, with no added pressure to buy.

3. Advertising

SEO and online advertising are a great way to help build up awareness, if it’s done correctly traffic to your website can see an increase. Be a company that a potential new customer sees when searching for a specific product and service online. Use your website’s contact page to make purchasing a of product or finding a retail outlet easier than ever before.

4. Professionalism

A website tends to increase the number of customers you may get. By this, they get to purchase your products as they have the pleasure of running through the website and know the kind of services that would suit them. It would be hard for your services to get a market if you lack a website on your company.

5. Growth Opportunity.

Websites are great ways in providing a place that potential investors can be referred to. It shows what your company is about, what it has achieved and what it can achieve in the future.

Interested in having your own website? click here to get us help you get one.

Want to get a domain and hosting services as well? take a look

Share this
11 Feb 2021

INTERNET SPEED DETERMINANTS

Internet speed determinants.

Broadband speed refers to how quickly data can be uploaded or downloaded. When comparing broadband deals, pay attention to how many Kbps or Mbps you get and at what cost.

Broadband speed is measured in Mbps (megabits per second) and Kbps (kilobits per second). A bit is the smallest unit of data that can be transferred so when it comes to calculating speed the higher the number of bits per second, the faster your broadband connection will be.

Kbps and Mbps measures are:

  • 1 Kbps: 1,000 bits per second
  • 1 Mbps: 1,000,000 bits per second

Speed is one of the main things you will need to consider, when choosing a broadband package. However, many consumers don’t know what broadband speed is or how many Mbps they’ll need when setting up broadband for their home or office.

Determinants.

To determine how much broadband speed, you need, you may also want to consider the usage requirement of everyone in your household or office. This is because the number of people using the connection can affect the overall broadband speed.

Ways to determine your current Broadband speed;

  • When choosing a bandwidth, you should consider the monthly bill as it should reflect the minimum speed you are getting.
  • Do a speed test online for the bandwidth you have chosen. These tests work by sending data to and from a main server. They then time how quickly the data completes the round-trip. The result gives you the exact current speed of your internet connection.

It’s good practice to regularly test the speed of your broadband connection. This way, you can always make sure that you are getting what you pay for.

Speed test on broadband.

 

 

A good broadband speed will depend on your personal preference and how you use the internet. We have 3 categories of users.

  • Light users: If you need a broadband connection to check your emails, do your online banking, and browse just a little, then you are a light user and your broadband speed can be kept minimal.
  • Medium users:If you use the internet frequently for social media, browsing the net, and catching up on the latest episode of your favorite series over and above the internet basics, then you’re considered a medium user. Medium users will need a slightly faster connection than light users.
  • Heavy users:If you use the internet for a significant amount of time, then you can be considered a heavy user. Heavy users are those who do peer-to-peer file sharing, online gaming or stream films and music.Speed is one of the main things you will need to consider, when choosing a broadband package. However, many consumers don’t know what broadband speed is or how many Mbps they’ll need when setting up broadband for their home or office. You can click here to see our internet packages that will suite your usage.
Share this
21 Sep 2020

VIRTUAL PRIVATE SERVERS (VPS).

VIRTUAL PRIVATE SERVERS (VPS).

A VPS is a virtual machine, performing the functions of a server, running on powerful server hardware.

VPS or a Virtual Private Server is a service used in the hosting world where it acts as a standalone dedicated server. With the use of cloud technology and virtualization, the VPS comes into play.

VPS server has its own dedicated resources but the difference is that in one powerful physical server there can be more than one VPS. By the use of virtualization, the physical server is divided into the required number of Virtual Private Servers and the resources are dedicated accordingly.

Virtualization Process.

Dedicated server.

virtualization process.

VIRTUAL PRIVATE SERVERS (VPS) USAGE.

  • Hosting a personal server

Keeping your most important files in a VPS set up with proper security measures could be a safe and cost-effective method for getting rid of those pesky external hard drives for backups. You could even set-up a private sync service on your VPS.

  • Testing Environment

A VPS is an excellent environment to test new software, operating system setups, and even new hardware before deploying to actual use.

  • VPS for VPN

With the alarming need to protect privacy on the Internet, more and more individuals use VPN for personal gains. If you share or access sensitive data or you don’t want anyone to know about your activities, you need to trust your VPN provider. In that case, you can become your VPN provider yourself and install a VPN server on a VPS.

  • VPS as a representative

It works as an intermediary between your device and the rest of the Internet. When your device sends a request, a proxy intercepts it and checks whether it has requested data in the cache. If yes, it returns the cached version of the data without connecting to the requested resource. If not, a proxy server passes your request further but changes your IP to its own. Just a click away to get our vps hosting plans. Here.

 

Share this
15 Aug 2020

YOUR INTERNET PACKAGES GUIDE

YOUR INTERNET PACKAGES GUIDE

 

What kind of user am I?

Not all broadband/internet package is created equal. With an array of super-fast fiber and standard broadband packages to choose from, there’s a lot to get to grips with when you’re looking for a product that will meet your needs.

Broadband for beginners

Starting out small and working your way up is a better bet for beginners than buying too much. If at a later date you find you need a faster, more expensive broadband product, providers will happily allow you to upgrade mid-contract.

Broadband for film and TV buffs

If you enjoy downloading HD movies or if you make extensive use of TV streaming services like Netflix or Amazon Prime Video, you’re classified as a heavy user. A heavy user should make sure whatever broadband package you sign up for has unlimited downloads. Nearly all packages these days do, but it’s a good idea to make sure. Heavy users may want to consider paying extra for fibre broadband. Fibre is faster than standard broadband and means you’ll be able to download movies, music and games a lot quicker. This way you’ll spend less time waiting and buffering and more time enjoying your entertainment of choice.

Broadband for families

Families are also almost certain to be heavy users, especially in homes with teenagers who’ve grown up with the web.

With four or more people in a household, all of whom are likely to be using a range of web-enabled gadgets and going online simultaneously. You’ll likely want to sign up for a fibre broadband package to ensure your connection is smooth. It’s also worth keeping an eye out for which broadband providers offer parental controls so you can keep your kids safe online. Most providers do include it as standard, but before signing up for a package, check the provider’s website.

Broadband for homeschooling students

What sets student broadband apart from other broadband packages is the contract length. The shorter contract term means students don’t have to pay for broadband during the long summer holiday, during which time they’re likely to be at home and not occupying their student digs. Be careful, though: a lot of student broadband packages include set-up fees. This pays to sit down and do the math to see whether you’re better off with a student broadband package or a cheaper, longer contract. You can find a good value homeschooling broadband deal here.

Broadband for businesses

If you run a business, you’re probably better off signing up for a broadband package that’s tailored to the needs of enterprises. Business broadband packages differ from standard consumer deals. Some include extras such as static/fixed-IPs, webspace and email addresses that feature the name of your business. They also offer business-grade security to keep sensitive information away from prying eyes. You will also get better customer support to minimize the financial impact if your connection goes down. Got a business? Find a broadband deal that’ll help you grow at our business broadband packages.

More factors you'll need to consider

Do I need internet security software?

Internet security should be a priority for everyone. With viruses able to infect computers from simply visiting nefarious sites, opening email attachments and downloading files. It’s imperative that you protect your computer and data against these attacks.

The good news is that, as with wireless routers, security suites are included in most broadband packages.

Do I need free phone calls with my broadband package?

If you use your landline, bundling your telephone and broadband packages can save you money and time. Most providers have package deals for the two. Take a look at our broadband and home phone packages site to see which deals are available in your area.

Do you need fast broadband?

With all this talk of megabits and download times, it’s sometimes easy to think that speed is the be-all and end-all in a broadband package. That’s true to a certain extent, but it’s also worth remembering that connection speeds of over 10Mbps are easily sufficient for most small households to carry out basic online activities without problems.

A broadband connection of 8Mbps will allow you to email, share pictures, watch Netflix, check Facebook and play games. Fast broadband — typically fiber-optic broadband products — appeals mainly to those who download more or less constantly and have very demanding applications.

Do I need TV with my broadband?

Opt to add TV to your broadband bundle and you’ll get a much wider choice of programmes to choose from, including movie premiers and glossy, must-see US dramas. You’ll also be able to see Premier League games live, as well as a host of other crown-jewels sports events.

Share this
15 Jul 2020

INTERNET USAGE IN KENYA DURING COVID-19

INTERNET USAGE IN KENYA DURING COVID-19
[vc_headings borderclr=”#000000″ align=”left” title=”INTERNET USAGE IN KENYA DURING COVID-19″ titlesize=”25″ titleclr=”#000000″][/vc_headings]

Internet usage in Kenya during covid-19 has drastically grown since the pandemic hit us. Kenya recorded the first case of corona-virus infection on 12th March. Since then, the numbers have continued to grow with a total of 103 infections and three fatalities as at 30th March. In order to curb spread of the disease,  the government instituted a number of measures including;

  • border closure,
  • mandatory 14 days self-isolation for returning travelers.
  • The government has announced a stay at home campaign,
  • ordered curfews
  • and banned public gatherings of more than 10 individuals.

The internet and related technologies have proven to be essential tools in this period for implementation of the measures and citizens’ exercising economic, social and political rights. Self-isolation is enforced through monitoring of movements via mobile phone. Further, citizens’ access to information related to the pandemic from health authorities is through Internet platforms. Meanwhile, business and education institutions have adopted the internet to continue operations.

There have been several positive and supportive developments through initiatives from technology service providers. Huawei has provided connectivity bandwidth to students from universities taking some of their sponsored short courses diploma levels. Mobile network operations have also doubled the speed of their mobile internet bundles for subscribers. However, this did not translate directly to home broadband internet subscribers. At KEMNET we are home broadband service providers in Kenya, currently based in Athi River. We are consistently expanding to other parts of the country as well. We  also embrace wireless internet provision along Mombasa road, Mlolongo and Syokimau.

Internet usage in Kenya during covid-19 stand at 39.6 million, of which 22 million are broadband subscriptions currently.

Effects of covid-19 in kenya
[vc_headings borderclr=”#000000″ align=”left” title=”EFFECTS OF THE CORONA VIRUS” titlesize=”25″ titleclr=”#000000″][/vc_headings]

Nonetheless, the current COVID-19 pandemic continues to expose inequalities of internet access in the country. With the closure of universities and other learning institutions, many have endeavored to continue their semesters through online delivery. Due to uneven network distribution in the country, students who had gone back to their rural homes expressed the frustrations of accessing the online learning platforms.

During the International Women’s day chat on remote working experiences for women, participants expressed the difficulties of working from home. This included frequent power outages and Internet downtime due to increased bandwidth demand, interrupted work from time to time. This is an indicator of the fact that most Kenyans access the Internet from their workplaces and that home broadband is still a luxury for many.

The implications of some enabling tech applications as solutions to the current situation also come with privacy costs.  Zoom has been the most downloaded mobile application in the past two weeks. House Party App has also been most popular last week for social connections that have replaced physical casual meetings. However, the privacy features of these applications are a concern for digital rights.

Government efforts to manage the health crisis have also had serious implications on freedom of expression. The Computer Misuse and Cyber-crime Act 2016 is being used to arrest persons who spread controversial information on the corona virus.

Meanwhile, innovators have also worked to provide technical solutions to the pandemic. For instance,a tracing application was launched to track travelers’ commuter paths. It requires commuters to share their contacts with the public transport service providers. Although, it is not clear what privacy safeguards are in place, which emphasizes the need for the developer’s community to be sensitized to apply the principle of privacy by design.

Overall, there is a need to balance the use of technology with human rights in response to the pandemic. As countries continue putting measures in place to contain the virus, they should also consider the rights and dignity of their citizens. Otherwise, we might risk losing the rights and freedoms we had steadily gained over many years. To get our home fiber services, wireless and business internet packages, click here and friendly costs.

Share this

© Kemnet Technologies. All rights reserved.

Click Me