The arrival of extensive undersea fibre optic cables in mid-2009 have spurred a major ICT revolution in East Africa with Kenya in the lead and Tanzania following close behind. The transition to broadband has spurred rapid growth in the number of Internet users and increased access for many to cheap Smartphones. Kenya has also been able to achieve faster broadband connection than their counterpart in South Africa. IBM even chose Nairobi for its first African Research Lab.
So, what does all this rapid progress mean for exposure to cyber attacks? More is at stake.
Cyber attacks could be devastating to a developing country on the path to a better future like Kenya. With the ever-increasing reliance upon and use of ICTs to enable more development, comes greater risk. Security problems like the defacement of government websites offering important services as well as attacks on the Banking sector, plus many others can be devastating in developing countries. “The use of ICT in many industries means that national infrastructure such as water companies, power infrastructure, banking and payments are exposed to ICT threats.” (Dennis Mbuvi, CIO/East Africa) For these reasons, Kenya just recently launched a National Cyber Security Strategy and Master Plan in February of this year:
- In a nutshell, the Strategy will enable the government, private sector and Chief Security Officer to “[come] up with a national cyber security assets inventory and [establish] approved cyber security vendors.” (Mbuvi)
- A data protection bill is also in the draft
- a consultant behind the plan, Tyrus Kamau, says “that its implementation will see better cyber security in the country, which will in turn lead to confidence in electronic transactions, resulting to economic growth. The move will also ensure confidence as the government rolls out various eGovernment services.” (Mbuvi)
Since I wrote my paper on the role of eGovernment in Tanzania, especially with regards to its role in establishing trust among citizens, I see huge potential in the implementation of a policy like this, especially in the rapidly developing ICT sectors in East Africa. I also think it’s interesting how what Kamau said is clearly where the benefits of employing an early plan for cyber security can be seen in developing versus developed countries. In countries like Kenya and Tanzania there is the need to establish trust and confidence from consumers who have been living for so long without these services, whereas in more developed countries like the U.S., the biggest threats are less of a concern to the public who is generally unaware so far of their [cyber attacks’] potential consequences. In my opinion it speaks volumes on the need for both developed and developing countries to establish comprehensive plans because regardless of their development levels, cyber threats/attacks can be detrimental to both of their economies, peoples’ livelihoods and overall safety.