{"id":12755,"date":"2017-04-18T11:51:21","date_gmt":"2017-04-18T08:51:21","guid":{"rendered":"http:\/\/www.tespok.co.ke\/?page_id=12755"},"modified":"2017-04-26T12:03:15","modified_gmt":"2017-04-26T09:03:15","slug":"tespok-icsirt-services","status":"publish","type":"page","link":"https:\/\/meet.tespok.co.ke\/?page_id=12755","title":{"rendered":"iCSIRT Services"},"content":{"rendered":"<p>&nbsp;<\/p>\n<ul>\n<li class=\"comment_even\" style=\"text-align: justify;\">\n<h3>SERVICES<\/h3>\n<ul class=\"commentlist\">\n<li class=\"comment_even\">\n<ul class=\"commentlist\">\n<li class=\"comment_odd\">\n<div class=\"author\"><span class=\"name\"><a href=\"#\">Incident Handling &amp; Response<\/a><\/span><\/div>\n<p style=\"text-align: justify;\">We identify, analyze, correlate and investigate cyber threats to prevent future attacks. Enterprises and institutions can email a report to icsirt(at)tespok.co.ke or call for assistance in the event of a computer security incident.<\/p>\n<\/li>\n<li class=\"comment_even\">\n<div class=\"author\"><span class=\"name\"><a href=\"#\">Network Activity Monitoring &amp; Reporting<\/a><\/span><\/div>\n<p style=\"text-align: justify;\">We track and monitor high severity malicious activity targeting respective local enterprises and institutions. This data is disseminated to the general public as activity reports on a periodic basis.<\/p>\n<\/li>\n<li class=\"comment_odd\">\n<div class=\"author\"><span class=\"name\"><a href=\"#\">Vulnerability Analysis &amp; Reporting<\/a><\/span><\/div>\n<p style=\"text-align: justify;\">We provide up to date data and statistics on vulnerabilities relevant to the Kenyan cyberspace as well as providing comprehensive tailor made report updates to vulnerable enterprises.<\/p>\n<\/li>\n<li class=\"comment_even\">\n<div class=\"author\"><span class=\"name\"><a href=\"#\">Cyber Security Awareness building &amp; Training<\/a><\/span><\/div>\n<p class=\"western\" align=\"justify\">We offer information security awareness training to ensure Kenyan Internet users and organizations are equipped with knowledge and approaches to detect and prevent cyber threats.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; SERVICES Incident Handling &amp; Response We identify, analyze, correlate and investigate cyber threats to prevent future attacks. Enterprises and institutions can email a report to icsirt(at)tespok.co.ke or call for assistance in the event of a computer security incident. Network Activity Monitoring &amp; Reporting We track and monitor high severity malicious activity targeting respective local [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"tags":[],"_links":{"self":[{"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/12755"}],"collection":[{"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12755"}],"version-history":[{"count":5,"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/12755\/revisions"}],"predecessor-version":[{"id":12806,"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=\/wp\/v2\/pages\/12755\/revisions\/12806"}],"wp:attachment":[{"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12755"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/meet.tespok.co.ke\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}