{"id":4516,"date":"2023-08-17T15:34:23","date_gmt":"2023-08-17T15:34:23","guid":{"rendered":"https:\/\/dotconnectafrica.org\/DCAAcademy\/?p=4516"},"modified":"2024-10-15T11:17:17","modified_gmt":"2024-10-15T11:17:17","slug":"countering-cyber-threats-in-the-digital-era","status":"publish","type":"post","link":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/","title":{"rendered":"Countering Cyber Threats in the Digital Era"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster <a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/what-is-cyber-security\/#:~:text=These%20threats%20range%20from%20ransomware,sure%20IT%20systems%20work%20properly.\">cybersecurity<\/a> in the digital age.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attack, likely carried out using sophisticated techniques, raised concerns about data breaches and service disruptions, impacting citizens and government operations alike.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Governments and organizations must prioritize cybersecurity, conducting regular assessments, implementing robust encryption, and encouraging multi-factor authentication. Raising cyber awareness among citizens is crucial, teaching them to identify phishing attempts and safeguard their information. Collaborative efforts and information sharing between governments and sectors can aid in identifying emerging threats swiftly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Adequate investment in cybersecurity infrastructure, including advanced technologies and dedicated response teams, is imperative to ensure a resilient defense against cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Visit <\/span><a href=\"https:\/\/dotconnectafrica.org\/DCAAcademy\/\"><span style=\"font-weight: 400;\">DCA Academy<\/span><\/a><span style=\"font-weight: 400;\"> to learn more.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecurity in the digital age. The attack, likely carried out using sophisticated techniques, raised concerns about data breaches and service disruptions, impacting citizens and government operations alike. Governments and organizations must prioritize cybersecurity, conducting regular assessments, implementing<\/p>\n","protected":false},"author":1,"featured_media":4811,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-4516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber , digital age<\/title>\n<meta name=\"description\" content=\"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecur\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber , digital age\" \/>\n<meta property=\"og:description\" content=\"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecur\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/\" \/>\n<meta property=\"og:site_name\" content=\"DCA Digital Academy\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-17T15:34:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T11:17:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1139\" \/>\n\t<meta property=\"og:image:height\" content=\"674\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dacademy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dacademy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/\"},\"author\":{\"name\":\"dacademy\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#\\\/schema\\\/person\\\/d0c3c91fde26a054c43f251fb3cb8cf8\"},\"headline\":\"Countering Cyber Threats in the Digital Era\",\"datePublished\":\"2023-08-17T15:34:23+00:00\",\"dateModified\":\"2024-10-15T11:17:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/\"},\"wordCount\":129,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/\",\"url\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/\",\"name\":\"Cyber , digital age\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg\",\"datePublished\":\"2023-08-17T15:34:23+00:00\",\"dateModified\":\"2024-10-15T11:17:17+00:00\",\"description\":\"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecur\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg\",\"contentUrl\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg\",\"width\":1139,\"height\":674,\"caption\":\"Countering Cyber Threats in the Digital Era\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/countering-cyber-threats-in-the-digital-era\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Countering Cyber Threats in the Digital Era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#website\",\"url\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/\",\"name\":\"DCA Digital Academy\",\"description\":\"DCA Academy website\",\"publisher\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#organization\",\"name\":\"DCA Academy\",\"url\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/dcaacademy-logo.png\",\"contentUrl\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/dcaacademy-logo.png\",\"width\":200,\"height\":200,\"caption\":\"DCA Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/#\\\/schema\\\/person\\\/d0c3c91fde26a054c43f251fb3cb8cf8\",\"name\":\"dacademy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d87ec4c3a5da02b308d5499e732daafe4d68d6570a8352cfda2801d540203232?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d87ec4c3a5da02b308d5499e732daafe4d68d6570a8352cfda2801d540203232?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d87ec4c3a5da02b308d5499e732daafe4d68d6570a8352cfda2801d540203232?s=96&d=mm&r=g\",\"caption\":\"dacademy\"},\"url\":\"https:\\\/\\\/dotconnectafrica.org\\\/DCAAcademy\\\/author\\\/dacademy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber , digital age","description":"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/","og_locale":"en_US","og_type":"article","og_title":"Cyber , digital age","og_description":"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecur","og_url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/","og_site_name":"DCA Digital Academy","article_published_time":"2023-08-17T15:34:23+00:00","article_modified_time":"2024-10-15T11:17:17+00:00","og_image":[{"width":1139,"height":674,"url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg","type":"image\/jpeg"}],"author":"dacademy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dacademy","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#article","isPartOf":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/"},"author":{"name":"dacademy","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#\/schema\/person\/d0c3c91fde26a054c43f251fb3cb8cf8"},"headline":"Countering Cyber Threats in the Digital Era","datePublished":"2023-08-17T15:34:23+00:00","dateModified":"2024-10-15T11:17:17+00:00","mainEntityOfPage":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/"},"wordCount":129,"commentCount":0,"publisher":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#organization"},"image":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg","articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/","url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/","name":"Cyber , digital age","isPartOf":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#primaryimage"},"image":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg","datePublished":"2023-08-17T15:34:23+00:00","dateModified":"2024-10-15T11:17:17+00:00","description":"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecur","breadcrumb":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#primaryimage","url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg","contentUrl":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg","width":1139,"height":674,"caption":"Countering Cyber Threats in the Digital Era"},{"@type":"BreadcrumbList","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/countering-cyber-threats-in-the-digital-era\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dotconnectafrica.org\/DCAAcademy\/"},{"@type":"ListItem","position":2,"name":"Countering Cyber Threats in the Digital Era"}]},{"@type":"WebSite","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#website","url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/","name":"DCA Digital Academy","description":"DCA Academy website","publisher":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dotconnectafrica.org\/DCAAcademy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#organization","name":"DCA Academy","url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#\/schema\/logo\/image\/","url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2020\/04\/dcaacademy-logo.png","contentUrl":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2020\/04\/dcaacademy-logo.png","width":200,"height":200,"caption":"DCA Academy"},"image":{"@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dotconnectafrica.org\/DCAAcademy\/#\/schema\/person\/d0c3c91fde26a054c43f251fb3cb8cf8","name":"dacademy","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/d87ec4c3a5da02b308d5499e732daafe4d68d6570a8352cfda2801d540203232?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d87ec4c3a5da02b308d5499e732daafe4d68d6570a8352cfda2801d540203232?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d87ec4c3a5da02b308d5499e732daafe4d68d6570a8352cfda2801d540203232?s=96&d=mm&r=g","caption":"dacademy"},"url":"https:\/\/dotconnectafrica.org\/DCAAcademy\/author\/dacademy\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false],"landscape":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false],"portraits":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false],"thumbnail":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-380x380.jpg",380,380,true],"medium":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-770x460.jpg",770,460,true],"large":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false],"1536x1536":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false],"2048x2048":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false],"post-thumbnail":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-370x219.jpg",370,219,true],"aduma-540-460":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-540x460.jpg",540,460,true],"aduma-700-700":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-700x674.jpg",700,674,true],"aduma-560-700":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-560x674.jpg",560,674,true],"aduma-566-448":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-566x448.jpg",566,448,true],"aduma-485-390":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-485x390.jpg",485,390,true],"aduma-700-460":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-700x460.jpg",700,460,true],"aduma-700-747":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-700x674.jpg",700,674,true],"aduma-770-572":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-770x572.jpg",770,572,true],"aduma-770-645":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-770x645.jpg",770,645,true],"aduma-770-283":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-770x283.jpg",770,283,true],"aduma-1170-356":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-1139x356.jpg",1139,356,true],"aduma-1920-516":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2-1139x516.jpg",1139,516,true],"aduma-1920-757":["https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-content\/uploads\/2023\/08\/Countering-Cyber-Threats-in-the-Digital-Era-2.jpg",1139,674,false]},"rttpg_author":{"display_name":"dacademy","author_link":"https:\/\/dotconnectafrica.org\/DCAAcademy\/author\/dacademy\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/dotconnectafrica.org\/DCAAcademy\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","rttpg_excerpt":"The recent cyber-attack on e-Citizen, a vital online Kenyan Government services platform, underscores the pressing need to bolster cybersecurity in the digital age. The attack, likely carried out using sophisticated techniques, raised concerns about data breaches and service disruptions, impacting citizens and government operations alike. Governments and organizations must prioritize cybersecurity, conducting regular assessments, implementing","_links":{"self":[{"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/posts\/4516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/comments?post=4516"}],"version-history":[{"count":3,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/posts\/4516\/revisions"}],"predecessor-version":[{"id":4938,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/posts\/4516\/revisions\/4938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/media\/4811"}],"wp:attachment":[{"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/media?parent=4516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/categories?post=4516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dotconnectafrica.org\/DCAAcademy\/wp-json\/wp\/v2\/tags?post=4516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}