{"id":2418,"date":"2009-12-14T00:00:00","date_gmt":"2009-12-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/14\/internet-security-firms-now-targeting-region\/"},"modified":"2021-12-30T11:41:18","modified_gmt":"2021-12-30T11:41:18","slug":"internet-security-firms-now-targeting-region","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/14\/internet-security-firms-now-targeting-region\/","title":{"rendered":"Internet Security Firms Now Targeting Region"},"content":{"rendered":"<p>An anticipated upsurge in Internet users in Africa and more specifically the East African region is drawing the attention of cyber security firms.  The region is now much more prone to Internet threats and cyber crime.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab, for instance, recently established its regional office in Johannesburg, South Africa, to oversee operations in sub-Saharan Africa, and especially in East Africa.  The firm, which was founded over a decade ago, commands over six per cent of the endpoint market to set up a base in Africa.  It already has a presence in 25 other countries across five continents.  Chief security expert at Kaspersky Lab, Costin Raiu, says the Seacom cable will connect a huge part of Africa to India, the United Kingdom, France and United Arab Emirates, thus predisposing it to suspect software.<\/p>\n<p>A 2009 web survey by McAfee titled Mapping the Mal Web found that the letter code at the end of a website address, referred to as the top level domain, determines chances of encountering malware, spam or other threats.  &#8220;When registering their websites, cyber criminals look out for low prices, easy registration, lack of regulations or a &#8216;no questions asked&#8217; policy,&#8221; states the report.<\/p>\n<p>And as the continent gears up to host the World Cup in 2010, experts warn this could further expose it to Internet attacks.<\/p>\n<p>http:\/\/allafrica.com\/stories\/200912141691.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2418","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2418"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2418\/revisions"}],"predecessor-version":[{"id":4905,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2418\/revisions\/4905"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}