Kenya has partnered with the United Kingdom (UK) to address cyber-security threats that have become rampant since the inception of digital technology. Speaking at a workshop for government communicators at a city hotel, the Principal Secretary (PS) for the State Department for broadcasting and telecommunications Esther Koimett said that the government was moving towards the adoption of provision of services through a digital platform, and as such, there is a need to shield the online systems from threats. Koimett acknowledged the steady rise of cyber threats globally, with Kenya among countries that have been targeted by hackers and cybercriminals. She said a number of government websites had been targeted. “This training is therefore important as it will enhance our capacity as government communicators to effectively play our role in informing citizens about how to protect themselves from cyber threats like the ever-emerging scams and fraudulent schemes,” said the PS. Given the increasing importance of technology and digitization in the delivery of services in every aspect of human interaction, Koimett stated that the goal of the training is to strengthen the strategic communications capability of the UK government, its allies, and partners to jointly understand and counter cyber threats from hostile state actors. “The training project consists of communications planning, delivery and training to support crisis communications and campaigns capability development for partner countries. It also touches on research and insights on critical audience vulnerabilities to underpin joint strategies and campaign development,” she said. Read also: Kebs Approves 40 New Information and Cyber Security Standards The government of Kenya, according to Koimett, recognizes the importance of public communications and uses...
Why My Model with 90% Accuracy Doesn’t Work Model Performance Metrics for Imbalanced Datasets When you’re dealing with marketing problems like customer churn (when a customer stops using a company’s product over a certain period of time) prediction, the raw dataset is often imbalanced, meaning that the classes are inherently not balanced. Basically, what this means is the percentage of your customers who churn might be a lot lower than those who don’t. In this example, the binary classification problem might have an 80–20 split, with only 20% of customers discontinuing their engagement with the company and 80% continuing to make a purchase. The problem is, that 20% could be VERY important to the business’s bottom line. Think about it — a gifting company has 100,000 customers with an average value of $50 per person. that’s $5,000,000 from those customers, but if 20% stop buying from the company, you’re losing $1,000,000! Over the course of a few years, that can add up for even the largest of ecommerce companies or brick and mortar shops. Therefore, a major goal for the company’s marketing department is to predict when a customer will churn and implement some sort of intervention to prevent that from happening. Machine Learning for Churn Prediction Now if your company has a good data science/data analytics team, you could be in luck. With a good customer churn prediction model, you can intervene before a customer abandons your business and potentially get them to return to their loyal status. Now, we get to the next problem — when we’re working with binary classification models, the imbalanced classes tend to...
Beware of unexpected USB keys in the mail, FlexBooker admits data theft and more. Welcome to Cyber Security Today. It’s Monday January 19th. I’m Howard Solomon, contributing writer on cybersecurity for ITWorldCanada.com. The group behind the Darkside and BlackMatter ransomware malware is mailing infected USB keys to American organizations. According to several news reports, the FBI has sent that warning to American businesses that subscribe to its security alerts. The contaminated USB keys are being sent by a package delivery service seemingly coming from the U.S. Department of Health and Human Services and allegedly have COVID-19 guidelines, or they are sent to seemingly look like a gift in a box with a fraudulent thank you letter. Infecting USB keys is an old tactic used by threat actors, stemming back from the days when memory sticks were expensive. Threat actors have been known to drop infected USB keys on the floor of a company or its parking lot. They have slipped them onto the desks of booths at trade shows, where USB keys are often given away by vendors. The attackers hope unsuspecting people will plug the device into their computers to find out who lost it, or to see what expect is a vendor’s product information. In the most recent case the infected USB key registers itself as a keyboard and installs code that downloads malware, leading to a ransomware attack. The best way to fight this kind of attack is to regularly remind employees to never plug USB sticks into that they don’t own into their computers — even if it’s a gift. Here’s some good news: Salesforce,...
The importance of cyber security is on the rise. Basically, today’s world is more dependent on technology than it was ever before, and it seems like this trend will prevail for a long time in the future. Moreover, businesses, whether small or big, tend to depend on cloud and computer systems for their day-to-day activities. Hence this increases the risk of data leaks, giving rise to the requirements of cyber security expert professionals. Further, cyber security expert courses are more accessible to people across the globe at present. And it seems like this trend will prevail for a long time in the future. In this article, we will explore the importance of cyber security in the current world scenario and the possible risks that cybercrimes can cost businesses. Explain the field of “cyber security”? Basically, cybersecurity refers to a process that protects and recovers online networks, programs, computer systems, and devices from different cyber attacks. Cyber or online attacks are the growing risks for your sensitive digital data as attackers are always up for using new methods for data breaching. In fact, they make use of artificial intelligence and social engineering to violate conventional online security procedures. And this is where cyber security comes into play. Here, the cyber security expert professionals, with their knowledge in the field, create specific algorithms that can eradicate any kind of online attack with their knowledge in the field. You will learn all these aspects of online hacking and other threats while completing your cyber security training online program. Due to the continuous development in innovative technologies, our society is all set to...
Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more This article was contributed by Dmytro Spilka. As the world online becomes increasingly congested in the wake of competitors discovering the potential of a rapidly accelerating market, big data analytics is quickly becoming an essential way for businesses to outperform their many rivals. With this in mind, how best can companies tap into the wealth of data left behind by consumers to better understand the ways they can mould their marketing campaigns? Statista data suggests big data market volume is set to top $100 billion over the next five years. This indicates that the marketing industry’s early analytical adopters are likely to pave the way for greater prosperity in the age of the “new normal” as ecommerce continues its growth away from the COVID-19 pandemic. Recent years have hosted a significant increase in the market volume of big data, and the pandemic is likely to ensure that this growth is sustained throughout the decade. This presents plenty of opportunities for marketers to strategize their growth beyond the ecommerce boom period brought on by the pandemic and widespread consumer adoption of online shopping. We can see that big data analytics has not been recognized as an essential facet in the sales and marketing departments of the pharmaceutical industry — more so than in any other sector. In fact, big data is almost twice as prevalent across this area of the industry as artificial intelligence. “The pandemic gave a big boost to the digital...
An app all attendees of the upcoming Beijing Olympics must use has encryption flaws that could allow personal information to leak, a cyber security watchdog said Tuesday. The “simple but devastating flaw” in the encryption of the MY2022 app, which is used to monitor Covid and is mandatory for athletes, journalists and other attendees of the games in China’s capital, could allow health information, voice messages and other data to leak, warned Jeffrey Knockel, author of the report for Citizen Lab. A screenshot of the MY2022 app available for download from the iTunes store. Photo: Screenshot The International Olympic Committee responded to the report by saying users can disable the app’s access to parts of their phones and that assessments from two unnamed cyber security organizations “confirmed that there are no critical vulnerabilities.” “The user is in control over what the… app can access on their device,” the committee told AFP, adding that installing it on cellphones isn’t required “as accredited personnel can log on to the health monitoring system on the web page instead.” The committee said it had asked Citizen Lab for its report “to understand their concerns better.” Unclear who app shares information with Citizen Lab said it notified the Chinese organizing committee for the Games of the issues in early December and gave them 15 days to respond and 45 days to fix the problem, but received no reply. “China has a history of undermining encryption technology to perform political censorship and surveillance,” Knockel wrote. “As such, it is reasonable to ask whether the encryption in this app was intentionally sabotaged for surveillance purposes or whether...
android developer singapore,web development singapore,mobile game developer singapore,singapore web design,design firms in singapore,developer in singapore,mobile apps development singapore,app development singapore,developers in singapore,app developer singapore,web application singapore,website developer singapore,singapore web development,singapore app developer,ruby on rails developer singapore,ios developer singapore,singapore web design services,web design services singapore,mobile developer singapore,singapore mobile app developer,design agency singapore,website design singapore,graphic designer in singapore,web designer singapore,ios app development singapore,web development company singapore,mobile application developer singapore,mobile app developer singapore,singapore website design,website designer singapore,web design company singapore,website development singapore,singapore mobile application developer,mobile apps singapore,mobile app development singapore,web design singapore,mobile application development singapore