COPY CAT GROUP

ABOUT
SUCCESS STORIES
NEWS
PARTNERS
CONTACT
  • COUNTRIES

  • More

    NEWS & UPDATES

    'BYOD’ shouldn’t mean ‘Bring Your Own Disaster’ – 7 Cybersecurity Tips Employees Should Take at Home

    November 27, 2017

    |

    Lara Fawzy

    Inspiration strikes when we least expect it. Ideas don’t always come to us in the office. In a ‘Bring Your Own Device’ or ‘BYOD’ world, work devices move with us, and employees introduce personal devices to corporate networks.  

    October is the European Cyber Security Mo...

    Read More
    Cyber Security

    4 Cyber Security Threats for 2017

    January 3, 2017

    |

    McAfee Labs 2016 Threat Predictions

    Cyber security threats aren’t going away. In 2017 there will be a number of them as technological development continues to advance rapidly and society becomes increasingly dependent on this technology — a boon for hackers who are only becoming defter by the day. While...

    Read More

    Here 's a DIFFERENT approach to staying ahead of hackers with CISCO TrustSec

    October 31, 2016

    |

    CISCO BLOG

    Can you think like a hacker?

    Another week and another list of companies whose reputation has been devastated by hackers. It’s not unsurprising as hacking techniques get more sophisticated and companies unwittingly increase their exposure driven by mobility, IoT and clou...

    Read More

    Database & Application Security

    July 25, 2016

    Database applications are often the epicenter of a company's sensitive data, so security is paramount, but maintaining a balance between security and business use can be tricky. If your organization collects and processes data, you face two major challenges: how to mee...

    Read More

    Data Encryption and Why you Need It.

    July 13, 2016

    |

    Furaha Mohamed

    When you hear the word encryption, the first thing that might come to mind is that it’s something only techies or geeks would understand, or use. In reality, the idea of encryption isn't that complicated. Encryption is a system of mathematical algorithms that encodes u...

    Read More

    8 Threats Your Antivirus Won't Stop

    July 4, 2016

    |

    Furaha Mohamed

    Businesses of all sizes face risks in the everyday acts of using digital technology and the Internet for legitimate purposes.

    We have outlined eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint...

    Read More
    Please reload

    Copyright © 2020 - COPY CAT GROUP. All Rights Reserved.

    COPY CAT GROUP

    Kenya

     

    Tanzania

     

    Uganda

     

    Rwanda

     

    Innotech

     

    CloudHop.it

     

    EOH SEAL

    WHO WE ARE

    About Us

     

    Board of Directors

     

    CSR Activities

     

    Feedback Form

     

    Careers

    ​

    Terms and Conditions

    ​

    Watch: A Story of Change

    ​

    ​

    ​

    GET IN-TOUCH

    Corporate Head quarters
    Muguga Green Lane,  Westlands 
    P.O. Box 49872 GPO 00100
    Nairobi, Kenya, East Africa.
    ISDN:  +254 709 873 000

                +254 20 397 0000  
    E: info@copycatgroup.com
    Website: www.copycatgroup.com

    Office locations: Kenya, Tanzania,                                 Uganda, Rwanda.

    SOCIAL FEEDS

    1

    .

    • Black Facebook Icon
    • Black Twitter Icon
    • Black YouTube Icon