Computaz Systems Limited

Computaz Systems Limited Armored cars,Body Armour,Secure Mobile Phones, Access Control, CCTV, UAV,ICT Security, GPS Tracking, Sole Africa providers of complete Secure Mobile phones.

Cybersecurity, Medical Supplies, Logistics, Library Equipt, Materials Handling & Distribution Equipment. We offer Access Control, CCTV, Electric fencing, ICT and Network Control & Optimization solutions and specialize in Security. Contact us for your Personal ody Armour, Armored Vehicle systems if you and your staff travel in volatile or generally unsafe roads where you may encounter explosives. Non-Lethal crowd control products.

Slight error phone no was 072 518062 cell phones was new phenomena then
02/11/2025

Slight error phone no was 072 518062 cell phones was new phenomena then

02/11/2025

Happy Baptism Anniversary Gene: Happy All Saints Day; btw phone no was 072 518062😂

Around the year 1000, as the practice of creating saints and buying relics became widespread and uncontrolled, the Church established a formal canonization process that required proof of miracles.

The celebration of All Saints began in the East during the 4th century and later spread to other regions, observed on different dates: May 13 in Rome and November 1 in England and Ireland starting in the 8th century. Rome adopted November 1 in the 9th century as well.

This solemn day occurs toward the end of the liturgical year, a time when the Church focuses on eternal matters. Therefore, it is fitting that the memories of those who have entered Heaven hold a special place in the hearts of the faithful.

Should your landlord lock you out of your house.
01/11/2025

Should your landlord lock you out of your house.

01/11/2025

As a tenant, no one should lock your doors

Hi. Your team is likely already using AI agents to boost productivity. But here’s the problem: every one of these tools ...
01/11/2025

Hi. Your team is likely already using AI agents to boost productivity. But here’s the problem: every one of these tools creates an unmanaged identity that could be accessing sensitive company data.

JumpCloud’s unified identity platform provides a single source of truth for all users and systems—including AI agents. No more wondering if and where agentic AI is being used across your workforce.

Once your identities are unified, you gain the control to see and manage every AI tool, enforce strong policies on all machine identities, and secure innovation without slowing your team down.

Stop worrying about what you can’t see. Contact us to try JumpCloud free for 30 days to see how easy it is to manage every identity in your organization.

Warm regards,

Computaz Systems Limited

The Human Side of Insider Threat Management: Why Mental Health MattersPublished On:April 18, 2024ContributorJOSHUA CRUMB...
10/10/2025

The Human Side of Insider Threat Management: Why Mental Health Matters
Published On:
April 18, 2024

Contributor
JOSHUA CRUMBAUGH
CEO & Founder
As cybersecurity professionals, we often focus on the technical aspects of our job – protecting data, identifying vulnerabilities, and implementing countermeasures. However, a recent encounter at the Insider Threat Summit in Monterey, California, reminded me of the essential human element behind insider threat management. During a panel discussion, one participant declared that their job was solely to protect data, and that addressing mental health issues was not part of their role. This statement struck a nerve, highlighting the need to recognize and address the emotional and psychological well-being of individuals within our organizations. After all, it's the human beings behind the data that ultimately drive the actions that can lead to insider threats. In this article, we will explore the importance of incorporating mental health awareness and support into insider threat management strategies and how doing so can create a more secure and compassionate work environment.

Understanding the Insider Threat

In order to fully grasp the human side of insider threat management, we need to define insider threats and recognize their various forms. Insider threats are security risks originating from within an organization, involving employees, contractors, or other trusted individuals with access to sensitive information or systems. These threats can be either malicious or unintentional.

The motivations behind insider threats can vary, ranging from financial gain and personal grievances to ideological reasons or simple carelessness. Human behavior plays a significant role in both types of insider threats, with factors such as emotional state, mental health, and workplace relationships heavily influencing an individual's actions. Consequently, organizations must adopt a comprehensive approach to insider threat management that not only implements technical safeguards but also addresses the emotional and psychological well-being of employees.

The Importance of Mental Health Awareness in Insider Threat Management

Mental health plays a crucial role in shaping individuals' behavior, making it an essential component of insider threat management. Issues such as stress, anxiety, depression, and burnout can contribute to insider threats, as they may lead individuals to act impulsively or negligently or even maliciously.

As cybersecurity professionals, we have an ethical responsibility to address mental health concerns within our organizations. By acknowledging the importance of mental well-being and incorporating support measures into our strategies, we can create more secure and compassionate work environments.

Addressing mental health in insider threat management brings multiple benefits. Not only can it help identify and mitigate potential threats more effectively, but it also fosters a culture of understanding, empathy, and support. This, in turn, can lead to increased employee loyalty, better communication, and improved overall security.

Recognizing Signs of Mental Health Issues among Employees

The ability to identify potential mental health issues among employees is a vital skill for those involved in insider threat management. By recognizing common indicators, cybersecurity professionals can take early action to provide support and mitigate potential risks.

Some common indicators of potential mental health issues include:

Changes in work performance, such as decreased productivity or increased errors
Changes in work performance, such as an increased productivigy
Withdrawal from social interactions or disinterest in previously enjoyed activities
Shifts in mood, including irritability, sadness, or anxiety
Sudden changes in appearance, such as poor personal hygiene or weight fluctuations
Unusual patterns of absenteeism or tardiness
Data analytics can play a crucial role in identifying at-risk individuals by monitoring for patterns of behavior that may signal mental health concerns. For example, monitoring email content, social media activity, and network usage can help detect potential red flags.

Once a potential mental health issue has been identified, it is essential to approach and communicate with the individual in a compassionate and non-judgmental manner. Encourage open dialogue and provide information about available resources and assistance. By fostering an environment of support, we can help our colleagues manage their mental health challenges while simultaneously reducing the risk of insider threats.

Implementing Mental Health Support Measures in Insider Threat Management Programs

Incorporating mental health support into insider threat management programs is a crucial step towards creating a more secure and compassionate work environment. By addressing the emotional and psychological well-being of employees, organizations can more effectively mitigate insider threats while fostering a culture of understanding and compassion.

Developing a proactive mental health support strategy

Organizations should establish a proactive mental health support strategy to identify and address potential issues before they escalate. This may involve regular mental health check-ins, employee assistance programs, and providing access to mental health professionals or counselors for confidential consultations.

Incorporating mental health awareness training for cybersecurity professionals

Cybersecurity professionals play a critical role in identifying and addressing mental health issues within their organizations. As such, it is vital to include mental health awareness training as part of their ongoing professional development. This training can help them understand the relationship between mental health and insider threats, recognize potential warning signs, and learn appropriate strategies for providing support.

Providing resources and assistance for employees facing mental health challenges

Organizations should offer a range of resources and assistance for employees who may be facing mental health challenges. This can include information on local mental health services, access to telehealth counseling, support groups, or flexible work arrangements to accommodate individual needs. By providing such resources, companies can demonstrate their commitment to employee well-being while reducing the likelihood of insider threats caused by unaddressed mental health issues.

In summary, implementing mental health support measures in insider threat management programs is an essential step towards creating a more secure and compassionate work environment. By proactively addressing mental health concerns and providing support, organizations can better manage insider threats and foster a culture of understanding and empathy.

Conclusion

The human side of insider threat management is crucial to creating a secure and empathetic work environment. By addressing mental health issues and providing support, organizations can more effectively mitigate insider threats and foster a culture of understanding and compassion. While the technical aspects of cybersecurity are undeniably important, recognizing and addressing the emotional and psychological well-being of individuals within our organizations is equally essential.

PhishFirewall plays a significant role in contributing to this holistic approach to insider threat management. By providing a comprehensive security awareness training program that includes mental health awareness, PhishFirewall helps organizations create a culture of empathy and understanding. Furthermore, its unique AI-driven platform enables organizations to adapt and respond to individual employee needs, resulting in a more personalized and effective training experience.

By integrating PhishFirewall into your organization's security strategy, you can not only enhance the resilience of your workforce against phishing attempts but also demonstrate a commitment to the well-being of your employees. In doing so, you contribute to a work environment that not only prioritizes security but also fosters a compassionate and supportive atmosphere, essential for addressing and mitigating insider threats.x

In conclusion, the human side of insider threat management is a vital aspect of cybersecurity that must not be overlooked. By incorporating mental health awareness and support into your organization's insider threat management strategies, you can create a more secure and compassionate work environment. With the help of tools like PhishFirewall, you can pave the way for a comprehensive approach to insider threat management that benefits both your organization's security posture and the well-being of your employees.

call (+254) 0737 686786

AI firm says its technology weaponised by hackers 8/28/2025Imran Rahman-JonesTechnology reporterUS artificial intelligen...
30/08/2025

AI firm says its technology weaponised by hackers 8/28/2025
Imran Rahman-JonesTechnology reporter

US artificial intelligence (AI) company Anthropic says its technology has been "weaponised" by hackers to carry out sophisticated cyber attacks.

Anthropic, which makes the chatbot Claude, says its tools were used by hackers "to commit large-scale theft and extortion of personal data".

The firm said its AI was used to help write code which carried out cyber-attacks, while in another case, North Korean scammers used Claude to fraudulently get remote jobs at top US companies.

Anthropic says it was able to disrupt the threat actors and has reported the cases to the authorities along with improving its detection tools.

Using AI to help write code has increased in popularity as the tech becomes more capable and accessible.

Anthropic says it detected a case of so-called "vibe hacking", where its AI was used to write code which could hack into at least 17 different organisations, including government bodies.

It said the hackers "used AI to what we believe is an unprecedented degree".

They used Claude to "make both tactical and strategic decisions, such as deciding which data to exfiltrate, and how to craft psychologically targeted extortion demands".

It even suggested ransom amounts for the victims.

Agentic AI - where the tech operates autonomously - has been touted as the next big step in the space.

But these examples show some of the risks powerful tools pose to potential victims of cyber-crime.

The use of AI means "the time required to exploit cybersecurity vulnerabilities is shrinking rapidly", said Alina Timofeeva, an adviser on cyber-crime and AI.

"Detection and mitigation must shift towards being proactive and preventative, not reactive after harm is done," she said.

'North Korean operatives'
But it is not just cyber-crime that the tech is being used for.

Anthropic said "North Korean operatives" used its models to create fake profiles to apply for remote jobs at US Fortune 500 tech companies.

The use of remote jobs to gain access to companies' systems has been known about for a while, but Anthropic says using AI in the fraud scheme is "a fundamentally new phase for these employment scams".

It said AI was used to write job applications, and once the fraudsters were employed, it was used to help translate messages and write code.

Often, North Korean workers are "are sealed off from the outside world, culturally and technically, making it harder for them to pull off this subterfuge," said Geoff White, co-presenter of the BBC podcast The Lazarus Heist.

"Agentic AI can help them leap over those barriers, allowing them to get hired," he said.

"Their new employer is then in breach of international sanctions by unwittingly paying a North Korean."

But he said AI "isn't currently creating entirely new crimewaves" and "a lot of ransomware intrusions still happen thanks to tried-and-tested tricks like sending phishing emails and hunting for software vulnerabilities".

"Organisations need to understand that AI is a repository of confidential information that requires protection, just like any other form of storage system," said Nivedita Murthy, senior security consultant at cyber-security firm Black Duck.

Firm hacked after accidentally hiring North Korean cyber criminal
What is AI, how does it work and why are some people concerned about it?
A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”
Sign up for our Tech Decoded newsletter to follow the world's top tech stories and trends. Outside the UK? Sign up here.

Cyber-crime
North Korea-US relations
Artificial intelligence
Cyber-attacks
North Korea
Related
Cyber-attack on UK contractor affects islanders
My ex stalked me, so I joined a 'dating safety' app. Then my address was leaked
Nigeria deports Chinese scammers in crackdown on 'foreign-led' cyber crime
More from the BBC

Copyright 2025 BBC. All rights reserved. The BBC is not responsible for the content of external sites. Read about our approach to external linking.

Visit BBC for trusted reporting on the latest world and US news, sports, business, climate, innovation, culture and much more.

Karura Forest is not personal property
30/08/2025

Karura Forest is not personal property

15/07/2025

Kenyan Bank Loses Sh517 Million in IT Breach, Funds Laundered via Cryptocurrency

Published: July 12, 2025
Kenyan Bank Loses Sh517 Million in IT Breach, Funds Laundered via Cryptocurrency

A Kenyan bank has reportedly lost over Sh517 million ($4 million) in a sophisticated IT breach involving insider sabotage and cryptocurrency laundering, according to a report by the Financial Reporting Centre (FRC).

The breach was orchestrated by contractors who deliberately downgraded the bank’s card security system from a secure setting to a weaker 2D configuration. This change bypassed key verification protocols such as One-Time Password (OTP) authentication, allowing attackers to generate unauthorized digital wallets linked to customer accounts.

The funds siphoned from these accounts were subsequently converted into USDT (Tether), a popular stablecoin, and transferred across decentralized cryptocurrency platforms. This made it difficult for authorities to trace or recover the money.
While the FRC did not disclose the name of the bank or the contractors involved, it flagged the case as part of a growing trend of insider-led digital bank fraud in Kenya.
Kenya’s growing exposure to cryptocurrency-based fraud has raised alarm bells within the financial sector. Between 2021 and 2023, the FRC received more than 14,000 suspicious transaction reports involving Sh6.9 trillion. Of this, over Sh6.3 trillion — more than 90% — was transacted through banks.
The report outlines several tactics used by fraudsters, including splitting transactions to avoid mandatory reporting thresholds, creating shell companies, and leveraging loosely regulated crypto platforms for money laundering.
The Central Bank of Kenya (CBK) and the Financial Action Task Force (FATF) have raised concerns over Kenya’s vulnerability. In February 2024, Kenya was placed on FATF’s grey list due to shortcomings in anti-money laundering (AML) and counter-terrorism financing (CTF) frameworks.
In response, the CBK carried out a sector-wide compliance review in December 2024. The findings revealed that digital lenders and third-party service providers remain major weak points in Kenya’s banking cybersecurity ecosystem. Despite CBK’s issuance of cybersecurity guidelines and tighter scrutiny of third-party vendors, many banks continue to outsource critical IT services without robust vetting mechanisms.
The global threat is also mounting. According to a 2023 FBI report, cryptocurrency fraud accounted for $5.6 billion in losses, marking a 45% increase from the previous year.
FRC’s 2023 risk assessment further warned that Kenya’s largely unregulated virtual asset ecosystem is vulnerable to exploitation by criminals and extremist networks. Previous scandals such as the Worldcoin iris scan saga — suspended in 2023 — underscore the urgency for stronger oversight of digital innovation.
As Kenya continues to lead East Africa in cryptocurrency adoption, experts warn that regulation must keep pace with innovation to protect both consumers and the integrity of the financial system.

Kenyan Bank Loses Sh517 Million in IT Breach, Funds Laundered via Cryptocurrency

© Nairobian.co.ke. All Rights Reserved.

Address

Karen Plains, Karen Road
Nairobi
00100

Opening Hours

Monday 07:00 - 18:00
Tuesday 09:00 - 17:00
Wednesday 09:00 - 17:00
Thursday 07:00 - 18:00
Friday 09:00 - 17:00
Saturday 09:00 - 13:00

Telephone

+254737686786

Alerts

Be the first to know and let us send you an email when Computaz Systems Limited posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Practice

Send a message to Computaz Systems Limited:

Share

Share on Facebook Share on Twitter Share on LinkedIn
Share on Pinterest Share on Reddit Share via Email
Share on WhatsApp Share on Instagram Share on Telegram