24 Mar 2021

PHISHING ATTACK

PHISHING

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or install malware on the victim’s machine.

Three Stages Of a Phishing Attack

Step 1: The Information (Bait)

The first of the three steps of a phishing attack is preparing the bait. This involves finding out details about the target. It can be as simple as knowing that they use a particular service or work at a particular business. If a service leaks a list of just email addresses of its users, criminals will be able to know all the owners of those email addresses. They will use that service and can target them with emails that pretend to be from that service.

In more sophisticated spear phishing attacks, cyber criminals can harvest details from your social media profiles in order to build a highly customized spear phishing message that is highly likely to convince you of its genuineness.

How to identify phishing attacks.

Glance at how your emails can be hacked.

Step 2: The Promise (Hook)

Once the attacker has acquired the necessary information to use as bait, they then need to lay out the hook. To actually make the target perform an action, the attacker needs to promise something or scare them into action.

In many scams the hook involves making the target believe that one of their accounts have been compromised. This creates a sense of urgency and making the target act quickly, perhaps without thinking. The attacker can then redirect the target to follow a link to a page where they can harvest the victim’s details.

Step 3: The Attack (Catch)

The third phase of phishing is the actual attack. The cyber criminal sends out the email, and prepares for the prey to fall for the bait.

What the attacker’s next action will be will depend on the nature of the scam. For example, if they used a landing page to gain the victim’s email password, they can then log in to the victim’s email account in order to harvest more information and start sending further phishing emails to the victim’s contacts.

Ways to Prevent Phishing Attacks

Don’t give your information to an unsecured site

If the URL of the website doesn’t start with “https” do not enter any sensitive information or download files.

Know what a phishing scam looks like

There are many sites online that will keep you informed of the latest phishing attacks and their key identifiers. The earlier you find out about the latest attack methods and share them with your users through regular security awareness training, the more likely you are to avoid a potential attack.

Install firewalls

Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker.

Don’t give out important information unless you must

As a general rule of thumb, unless you 100% trust the site you are on, you should not willingly give out your card information.

Need domains and hosting, Internet connection, Web solutions? Feel free to contact us anytime. Give us a call or drop us an email.

 

Share this
24 Feb 2021

THE INTERNET AND ITS USAGE.

THE INTERNET.

The internet is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices. The internet provides networking, as it links computers to allow them operate interactively. It is a network of networks that share each other. It is inter-working as it can connect to different networks using intermediary devices. On the internet every device has its own unique IP address. Principles of an IP address:

  • It identifies the host,specifically its network interface
  • It provides the location of the host in the network.

Principles of an IP address is characterized as follows:

  • A name indicates what we seek.
  • An address indicates where it is.
  • A route indicates how to get there.
  • The header of each IP packet contains the IP address of the sending host, and that of the destination host.

PEERING ON THE INTERNET.

Peering is a process by which two internet networks connect and exchange traffic. This allows direct hand of traffic between customers without having to pay a third party to carry that traffic across the Internet for them. This could involve running a circuit across town from one network’s facility to the other’s. Network operators may peer for reasons such as:

  • They have control over their traffic, in that it goes across the Internet via whatever path the transit provider decides to use.
  • It’s cheaper to hand off traffic themselves rather than paying somebody else to do it.
  • It gives greater control over their traffic flows, or allows them to better serve local populations.

 

PEERING

Peering is typically settlements free.

We have two main types of peering, public and private peering.

Public peering, done through an Internet exchange, is more common and more efficient. An Internet exchange is an Ethernet switch in a data center, which all the networks peering in the facility connect to. A network can peer with many other networks through a single connection using an Internet exchange. Peering arrangements needs to be negotiated with each peer, but no new cabling needs to be done.
Private peering within a data center combines the two approaches. Two networks put routers in the same building, and run a direct cable between them rather, than connecting through the exchange point switch. This is most useful when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point. This is sometimes done when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point.

Check out our packages and feel free to contact us here.

 

 

Share this
21 Sep 2020

VIRTUAL PRIVATE SERVERS (VPS).

VIRTUAL PRIVATE SERVERS (VPS).

A VPS is a virtual machine, performing the functions of a server, running on powerful server hardware.

VPS or a Virtual Private Server is a service used in the hosting world where it acts as a standalone dedicated server. With the use of cloud technology and virtualization, the VPS comes into play.

VPS server has its own dedicated resources but the difference is that in one powerful physical server there can be more than one VPS. By the use of virtualization, the physical server is divided into the required number of Virtual Private Servers and the resources are dedicated accordingly.

Virtualization Process.

Dedicated server.

virtualization process.

VIRTUAL PRIVATE SERVERS (VPS) USAGE.

  • Hosting a personal server

Keeping your most important files in a VPS set up with proper security measures could be a safe and cost-effective method for getting rid of those pesky external hard drives for backups. You could even set-up a private sync service on your VPS.

  • Testing Environment

A VPS is an excellent environment to test new software, operating system setups, and even new hardware before deploying to actual use.

  • VPS for VPN

With the alarming need to protect privacy on the Internet, more and more individuals use VPN for personal gains. If you share or access sensitive data or you don’t want anyone to know about your activities, you need to trust your VPN provider. In that case, you can become your VPN provider yourself and install a VPN server on a VPS.

  • VPS as a representative

It works as an intermediary between your device and the rest of the Internet. When your device sends a request, a proxy intercepts it and checks whether it has requested data in the cache. If yes, it returns the cached version of the data without connecting to the requested resource. If not, a proxy server passes your request further but changes your IP to its own. Just a click away to get our vps hosting plans. Here.

 

Share this
01 Jul 2020

Tips On Branding Your Business

Branding Trends

Define Your Branding

In order to define your branding you need to have  self-discovery for your business. Branding needs at least your company or business to have a mission. The mission helps to know which direction the company is taking. You need to know the benefits and features of your products and services that you are offering. Getting to know your products and services helps more in knowing the type  of customers to expect and how to deal with them.

It is also important to know, what your customers and prospects think of your company. What customers think of your company or business helps you to know what your strengths and weaknesses are. You can also get ideas on what to input or output in your company. What qualities would you want them to associate which your company? give them your best services and they will definitely give you a high ranking.

Once you have defined your brand, get the word out there by;

  • Getting a great logo and placing it everywhere, let your brand be known.
  • Develop a tagline that is memorable, meaningful and concise. A statement that captures the essence of your brand.
  • Integrate your brand by extending every aspect of your business. How you answer your phones,your salespeople wear on calls.Simply get everything on the right track on the business.
  • Be true to your brand, give a legit service or product and your customers will definitely recommend you to someone else.
  • Have a message for your brand, a key message that you want to communicate about your brand. Also get your employees to be aware of your brand attributes.
  • Be consistent, continue with the positive trends in order to maintain your business and expand it as well.

Defining your brand helps your costumers understand your products and services more. Depending on how your branding game is, customers might not need to look for other options on the same product. You can check on our page for our brands. Just a click. 

 

Share this
23 Jun 2020

E-LEARNING IN KENYA

e-learning in Kenya

online presence

ELECTRONIC LEARNING IN KENYA

E-learning in Kenya has seen massive growth and has a very promising future as more youth are working and continuing their education simultaneously as more universities embrace this, going as far as to make certain courses accessed online only. E-learning or electronic learning refers to a learning system done online using an electronic device.

Although there is tremendous growth in e-learning in Kenya the demand for  learning is also increasing rapidly. More people are embracing studying online therefore creating an avenue for revenue for different people in the education sector.

Different sites have come up focusing on different topics from digital marketing to programming to agricultural know how. For example https://elearningsolutions.co.ke/

Advantages of e-learning in Kenya

  1. Flexibility. E-learning for students and lecturers as it can easily be fixed in a busy schedule making it convenient for them. One does not have to plan in advance to study. You can easily put it in between the activities you have for the day.
  2. Saves You Time And Money. Online study eliminates the need to travel . There is no need to be physically present in a classroom. It reduces the time you will be required to be away from the workplace and it saves you both time and money.
  3. Giving an opportunity for everyone to express their views. Most people feel embarrassed to speak in public. Many people react better online, answering more questions to teachers through groups on the Internet than in person.
  4. Lastly, online courses and studying by yourself creates the feeling of teaching yourself. This encourages you to take up the responsibility of your own education.  We must consider e-learning as a method of educating ourselves even after entering the work force

Although e-earning in Kenya is new and many Kenyans embrace this option of studying even with the challenges that should addressed. This will only work if the government and the private technology sector work hand in hand to beat these challenges. Check out our internet packages that would help you out in e-learning. Just a click.

 

 

 

Share this
01 Jun 2020

WIRELESS NETWORKS.

Wireless Networks

HAPPY FAMILY ENJOYING KEMNET WIRELESS NETWORK

Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. They use radio waves to connect devices such as laptops to the Internet, the business network and applications.

Four Types Of Wireless Networks.

These are created through the use of mobile phone signals typically provided and maintained by specific mobile phone service providers. WWANs can provide a way to stay connected even when away from other forms of network access. Covers large areas such as neighboring towns and cities.

WLAN are wireless networks that use radio waves. The backbone network usually uses cables, with one or more wireless access points connecting the wireless users to the wired network. The range of wlan can be anywhere from a single room to an entire campus.

WPANs are short-range networks that use Bluetooth technology. They are commonly used to interconnect compatible devices near a central location, such as a desk. A WPAN has a typical range of about 30 feet. Interconnects devices in a short span, generally within a person’s reach.

Connects several wireless LANs.

Metropolitan area network is similar to a local area network (LAN) but spans an entire city or campus. MANs are formed by connecting multiple LANs thus, MANs are larger than LANs but smaller than wide area networks (WAN).
MANs are extremely efficient and provide fast communication via high-speed carriers, such as fiber optic cables. To get all our home wireless packages, its a click away. Here.

KEMNET WIRELESS NETWORKS

Discover how you can benefit from affordable High speed Dedicated Kemnet wireless network packages

Share this
14 May 2018

Managed Service Provider

Managed Service Provider.

Managed Service Provider, also known as MSP. This is a service provided by IT companies to small and medium-sized business, and sometimes large organizations, governments and non-profits.

It is applicable in instances where by the businesses do not have full-time in-house IT staff members.

A MSP either charges on an annual basis or a monthly recurring fee. There is a service level agreement (SLA) that is tied to the contract. The contract is well detailed with a list of all items and tasks to be included.

Managed Service Provider

Tasks list might include as;

  • 24/7 network monitoring of servers,
  • desktop,
  • laptops
  • endpoint devices.

Depending on the terms and conditions spelled out in the contract the service provider may also include repairing any issues that arise, patching of devices to keep them updated and monitoring the system. www.kemnet.co.ke

Types of MSP Providers

  • Network Infrastructure
  • Software as a Service (SaaS)
  • Communication Services
  • IT Support
  • Security as a Service

MSP provides a great value for money by being proactive in fixing issues before they occur. MSP assists in optimizing the IT environment to prevent and lessen the need for regular break/fix issues. Mostly MSP provides remote services. A Remote Monitoring and Management system (RMM) monitors and fix issues remotely.

MSP has access to the environment and regularly monitors it and is better prepared for any emergency issues that may arise. It also has skilled technicians in Level 1, 2 and 3 that assist with the IT tasks and fix arising IT issues.

The MSP provides different billable rate for each technician assigned to work on any given issue.

Once you start working with a managed service provider, the remote team will take over on day-to-day monitoring and maintenance for your network, sometimes including jobs like antivirus protection.

Monitoring Your Network

IT service providers use remote monitoring and managing (RMM) software for networks and servers. RMM software enables the MSP company to easily manage your network and closely monitor it without sitting next to a server. If something goes wrong, or if a server on the network isn’t operating as it should, the RMM software notifies a system administrator. This software can also make it much easier to apply important updates, like security patches. It can even automate routine processes like finding more disk space for a server.

Share this

© Kemnet Technologies. All rights reserved.

Click Me