Technology with Trust Since 2006 Nairobi, Kenya

📢 Understanding the Kenya Cybersecurity Incident Report Form

Why Reporting Cybersecurity Incidents in Kenya Matters

A Practical Guide to the Government Cybersecurity Incident Report Form

As Kenya continues its rapid digital transformation, cyber threats are no longer rare or isolated events. From phishing emails and ransomware attacks to data breaches and system intrusions, cyber incidents now affect government institutions, hospitals, financial organizations, SMEs, and individuals alike.

To strengthen national cyber resilience, the Government of Kenya, through the Ministry of ICT and the Digital Economy – Directorate of ICT Security, has introduced an official Cybersecurity Incident Report Form. This form provides a structured and secure way to report cyber incidents to national authorities.


What Is the Cybersecurity Incident Report Form?

The Cybersecurity Incident Report Form is an official online reporting tool hosted on the Ministry of ICT website. It allows organizations and individuals to formally notify the government about cybersecurity incidents that may pose risks to systems, data, or national digital infrastructure.

🔗 Official reporting link:
https://ict.go.ke/form/directorate-of-ict-security-and-/


Why the Cyber Incident Report Form Is Important

1. Enables Rapid National Response

Early reporting allows cybersecurity authorities to assess threats quickly and coordinate responses before incidents escalate or spread to other organizations.

2. Protects Critical Digital Infrastructure

Kenya’s healthcare systems, financial services, government platforms, and utilities rely heavily on digital systems. Reporting incidents helps safeguard these critical services.

3. Builds National Cyber Threat Intelligence

Incident data helps the government identify trends, emerging threats, and common attack methods—enabling preventive advisories and better policies.

4. Supports Investigations and Legal Action

Accurate incident reports support digital forensics, regulatory compliance, and law enforcement investigations where cybercrime is involved.


Who Should Use the Form?

The form is intended for:

  • Government ministries, departments, and agencies

  • County governments

  • Hospitals and healthcare facilities

  • Banks and financial institutions

  • Schools and universities

  • Private companies and SMEs

  • NGOs and development partners

  • Individuals affected by cyber incidents


Types of Cyber Incidents to Report

You should submit a report if you experience:

  • Phishing or email scams

  • Ransomware attacks

  • Malware or virus infections

  • Data breaches or unauthorized data access

  • Website defacement

  • System hacking or intrusion attempts

  • Denial-of-Service (DoS/DDoS) attacks

  • Insider cyber threats


How to Fill the Cybersecurity Incident Report Form

Below is a breakdown of each form field and how it should be completed, with sample data for guidance.

Field

What It Means

Sample Entry

Name of Organization

Official name of the affected entity

ABCDEF Hospital

Email Address

Contact email for follow-up

ict@abcdef.co.ke

Type of Cyber Threat

Nature of the incident

Phishing

Description of Incident

Brief explanation of what happened

Staff received fake emails requesting login credentials impersonating Bank

Date of Incident

When the incident occurred or was detected

2026-01-05

Action Taken

Immediate response actions

Accounts disabled, passwords reset, systems scanned

Attach Evidence

Supporting files

Screenshot of phishing email

Urgency Level

Severity or impact

Medium

Consent / Declaration

Confirmation of accuracy

I agree

 

Best Practices for Effective Reporting

  • Report immediately after detection

  • Preserve evidence (logs, emails, screenshots)

  • Be factual and clear—avoid speculation

  • Do not erase compromised systems before reporting

  • Coordinate internally with ICT or security teams


What Happens After You Submit the Report?

Once submitted, the report is reviewed by national cybersecurity authorities who may:

  • Analyze the threat and assess its severity

  • Provide technical guidance or recommendations

  • Coordinate response efforts with national cyber teams

  • Issue advisories to protect other organizations

  • Support law enforcement investigations if required


Why Cyber Incident Reporting Is Everyone’s Responsibility

Cybersecurity is no longer just an ICT department issue—it is a national security and business continuity concern. Prompt reporting helps protect sensitive data, ensures service availability, and strengthens trust in Kenya’s digital ecosystem.

One reported incident can prevent hundreds of future attacks.


Final Call to Action

If your organization or system experiences a cyber incident, do not stay silent. Use the official Cybersecurity Incident Report Form and play your part in securing Kenya’s digital future.

🔗 Report incidents here:
https://ict.go.ke/form/directorate-of-ict-security-and-/

Leave a Reply

Your email address will not be published. Required fields are marked *