It has never been more important for businesses to own websites like it is today. A website can be quite an effective tool for marketing your business at a low cost. It gives you the power to:-

  • Create a presence and have people know about your business. For example, brand value propositions and professionalism.
  • Websites are a point of contact between other clients visiting your site and the website owner.
  • Based on your history from your website, prospects and new clients can gain trust from learning more about you and enter a comfort level.
  • Websites can also help create large networks for you online and give you an opportunity to create more buzz for yourself.

As much as having a website is crucial to your business, understand that designing one is not an overnight task. It takes a lot of time to understand a clients needs, apply creativity and actively create a website that caters to both the client and client’s clients.

Top 5 Challenges Faced by Website Developers

  1. Offering excellent integration so that the website can harmonize well with other applications like Twitter, MPESA etc.
  2. Promoting good and consistent user experience through the entire site for brand consistency and ease of navigation
  3. Sustaining fast speeds when visitors land on the homepage or switch between different web pages.
  4. Ensuring the website is secure from harmful malware and hackers.
  5. Ensuring that the website is responsive on different hardware platforms like tablets, smartphones and PCs.

To have all this in one basket and come up with a ready working website, demands effort, time and concise expertise. As a matter of fact, this kind of competence needs a lot of training and practice.

But despite the challenges, there is good news. You as a client, can help speed up the website development process. How?

3 Tips for The Fastest Website Development Process

  1. Have a clear picture of what you want.

Many people tend to rush to web designers and developers before prior planning. Setting a goal and working towards it help prevent wastage of time and resources. Investigate your target audience, what their needs are and how the website can successfully meet those needs. For example, a website for generating leads will be quite different from an e-commerce website.

  1. Understand the Steps Involved in website Development

Try to get a better understanding of the steps involved in developing and designing a website to save on time and improve efficiency. This way, you will always be ahead of the game and won’t have to rush around in a frenzy to beat the deadline.

  1. Get You Content Ready

It is MOST important to ensure that you have your content ready even before approaching the developers. Keep in mind that the developers are skilled at writing lines of codes and designing your website, however they haven’t a clue about content creation. To save on time, consider hiring a freelance content writer from Fiverr.com or Iwriter.com. 

Wrap UP

Just like any other business investment, your website is an investment that must give back returns. Consider using these tips to ensure fast project completion and even faster ROI.

Need help developing your website fast? Talk to us 🙂



Did you know that more than half of business websites are NOT prepared for cyber attacks? Learn more about what is  website hacking, the different types of website hackers and the methods they use.

What is Website Hacking?

Hacking refers to the identification of weaknesses in computer networks and systems to exploit them and gain access. A lot of businesses are now relying on computers and networks to conduct their activities smoothly. These computers have to connect to others in external systems, and this exposes them to third parties and hacking. Hackers use computers to propagate fraudulent acts like privacy invasion, fraud, stealing personal/corporate data and much more. It is one of the most prevalent and dangerous forms of cyber crime afflicting a lot of businesses today due to the massive monetary losses. Here is a brief history of this vice and overview of the types of hackers, how it occurs and the various tools and techniques used by hackers.

History of Web Hacking

It is fascinating to note that the history timeline of hacking sometimes began in the 1960s. During this time shortcuts were being developed to improve or bypass the standard system’s operation. It was designed for a good cause back then as it helped people quickly evaluate as well as improve systems that were faulty by optimizing them. In the 1960s, mainframes were the available computers, and they had to be locked in glass and temperature controlled areas. Running these machines used to cost a lot of money meaning that the programmers had little or limited access to the computers.

A group of smart students from MIT who had an immense curiosity to find out how things worked was involved in the creation of “hacks.” These hacks were programming shortcuts aimed at completing the computing tasks at a faster rate. There were instances where the hacks were way better than the original programs. In 1969, two Bell Lab employees who formed part of its think tank created a Hack. The hack (UNIX) had the ability to act as an open set of rules that were used to run machines from the computer’s frontier. The two were Ken Thompson and Dennis Ritchie. In the 1970s, the whole world was ready and primed for hackers. For the hackers in this era, they had the time to study the working of the wired world and hacking went from being a simple, practical joke to a more dangerous thing. The 80s saw the vice reach the peak regarding its seriousness. The vice increased due to the increase in the usage of computers following the introduction of personal computers by IBM in 1981.

6 Types of  Website Hackers

A hacker is a party who finds and then exploits the weaknesses present in computer systems or networks to gain access. Hackers are mostly highly experienced computer programmers who have a sound knowledge of web security. The intent mainly classifies various types of hackers read from their actions. Here are the different types of hackers.

1.Ethical Hacker (White Hat)

An ethical hacker is a type that gains access to computer systems with a view of fixing the weaknesses identified. They also carry out vulnerability assessments and testing.

2. Cracker (Black Hat)

A Cracker refers to a hacker who gets unauthorized right of entry to a computer system for their gain. Their primary intent is a violation of privacy rights, steal corporate data as well as transfer money from some bank accounts, etc.

3. Grey Hat

A hacker who occupies the rank between black hat and ethical hackers. This type of hacker will hack into the system without the owner’s authority to find the weaknesses in it and convey the same to the proprietor of the scheme.

4. Script Kiddies
Script Kiddies Refer to a person who is not skilled but relies on already existing tools to gain access to the computer systems.

5. Hacktivist
A hacktivist is the type of hacker that uses hacking as a tool for sending religious, social and political messages. Hacktivists usually hijack websites and leave their message on the hijacked sites.

6. Phreaker

A phreaker, on the other hand, is a hacker who identifies and goes ahead to exploit weaknesses in telephone networks as opposed to computers.

Major Web Hacking Techniques and Tools

Hacking is utilized for both finding flaws in computer systems and malicious activities. The techniques and tools used by hackers are well known to them as they know the best ones that will suit their intended purposes. Examples of commonly used hacking tools include Angry IP scanner, Cain & Abel, Kali Linux, Burp Suite, John the Ripper, Ettercap, and Metasploit among others.

Top 3 Hacking Methods Used by Hackers

Hacking is a real threat to all types of businesses regardless of their size. Hackers use some ways and techniques to attack sites on the internet. Here are some traditional methods that hackers use to gain access to sites and destroy your business.

1.Injection attacks are one of the methods employed by hackers especially if there are any flaws present in your SQL libraries, SQL database or the operating system. Hackers send files that seem credible, and your employees might open them and unknowingly activate “injections” and commands. When this happens, hackers gain access to your private data.

2. Another common method they use is the cross-site scripting attacks or XSS attack; this occurs when a URL for an application is sent to the user’s browser window, and it bypasses the validation process. When an XSS script is triggered, users are deceived that the compromised page is the legitimate one.

3. Hackers also exploit the user verification system if it is weak via broken authentication and session management attacks. A hacker will use the session and authentication management to assume the identity of another person. Hackers can also hack your computer system using other attacks like clickjacking (UI Redress Attack), DNS Cache poisoning, symlinking, social engineering, remote code execution and distributed denial of service (DDOS).


This writer does not like writing such scary blogs but considering the rate at which people are being hacked these days, he may as well get used to it.

The IT world has been set ablaze with the news that Deloitte, a firm that sits pretty at the top of the “Big Five” accountancy firms, was the target of what news outlets dub as “a sophisticated hack that compromised the confidential emails and plans of some of its blue-chip clients.” Apart from auditing, Delloite also offers tax consultancy and high-end cybersecurity to Apple, Microsoft, Glaxosmithkline Procter & Gamble, GM, Boeing, Morgan Stanley, Berkshire Hathaway and Starbuck’s and other world-beaters. These companies played their part in ensuring Deloitte hit a record $37bn (£27.3bn) revenue last year.

So far, six of Deloitte’s clients (not necessarily the aforementioned) have been told their information was “impacted” by the hack. If Microsoft is one of the very unlucky six, it remains to be seen how they will react given that the emails to and from Deloitte’s 244,000 staff were stored in their product; Azure cloud service.


READ MORE: Hack of the Century Should Have Been Seen Coming 


Deloitte’s website famously says that “Cyber risk is more than a technology or security issue, it is a business risk,” Ironically, it continues that “While today’s fast-paced innovation enables strategic advantage, it also exposes businesses to potential cyber-attack. Embedding best practice cyber behaviours help our clients to minimise the impact on business.”

The hackers, who used an administrator account to gain unrestricted access to all areas, targeted info of Deloiite’s super clients, which was in abundance on the company’s email system given the first step of auditing is total surrender of information. Usernames, passwords, IP addresses, architectural diagrams for businesses and health information were not spared either.

As the norm is these days, Deloitte is said to have discovered the hack in March this year, a cool 4 or 5 months before the attackers are believed to have accessed the precious systems. Another 6 months were to pass before the information reached the public and sent tongues wagging on the usual conversation.

Who is safe now?  If a company that was ranked the best cybersecurity consultant in the world just 5 years ago could not hold its own against cyber attackers, who should not be worried? These guys have a whole CyberIntelligence Centre” to provide clients with “round-the-clock business focused operational security” but still …

Cybersecurity, previously confined to Sci-Fi movies, is becoming real with each passing day. Companies are increasingly conscious of this; something that is being reflected by the many inquiries in our desk. Our clients are demanding cyber-security solutions more than any other of our services and as usual, we are happy to help.

So, have you contacted us? What you gonna do when they come for you?

How Sentinel Helps you Manage your Database

Keeping a building operating in a safe and secure manner involves a lot of different things. For those with a need for security, access control systems allow for the careful control of who has access to a building or to specific parts of that building.

Today’s access control systems rely on modern technology to function at their highest capabilities, and there are numerous benefits that this technology can offer. However, without routine maintenance all the technology in the world will be of little consequence.

For starters, regular database maintenance is a must. In most of today’s systems, the database is used to control who is allowed access into buildings or into specific areas within the building. Obviously, keeping this database as up to date as possible is a must. Employees who leave the company must be deleted from the system in order to prevent them from gaining access later – especially if their access cards aren’t returned as needed.

Along with employees that have left, it’s also important to keep track of changes in the facility or in an employee’s duties. Employees that get promotions or move to other departments may need new access controls, or if a facility section changes its focus or functions it may change the access restrictions as well. In these cases it’s important that all changes are quickly entered into the control system to keep a facility operating as it should.

Obviously, keeping track of all the changes within a company can be very difficult to do. As a result, companies should conduct regular reviews with access control department leaders in order to make sure that all employee information in the database is accurate and set to the proper level of access. Most companies do this on an annual basis, but more frequent meetings may be needed if changes occur before the annual review.

Backup is vital as well. Regularly backing up a database is important in the event that a system failure occurs and information is lost. Rather than having to re-enter information manually the backed up database can be reloaded to simplify the process and prevent the chance of serious errors. Backups are usually done on a monthly basis, but in large companies or companies that have a higher than average turnover rate a weekly backup may be a better idea. In either case, it is an important way to prevent the loss of database information and keep a facility working properly.

If a business or facility has already invested time and energy into working on maintaining its hardware – doors, readers, and more – it’s also important that as much attention be paid to the access control system’s software and central database. Taking the time to keep everything updated and well maintained could make a much bigger difference than a facility manager realizes. Sentinel Helps You Attain That.


How Sentinel Incorporates “Mustering”

In facilities with high security requirements or where hazardous materials exist, the practice of mustering is becoming more commonplace. Mustering means using the access control system to keep a record of who is in the building at all times so that, in the event of an evacuation, a list of everyone in the building at the time of the evacuation can be consulted and people checked off as they’re accounted for. Essentially, the practice of mustering means that people log in and out of a building, just like they would a computer.

To properly enact a mustering program, access control devices are installed at all exit points, or at muster stations safety areas where people congregate in the event of an emergency. The visitor management policy must require card access and must be enforced meticulously, both by the guards and by the facility’s occupants.

Sentinel aims to practice mustering by controlling and keeping track of persons and vehicles coming in and out of  a facility. Also provides reports that shows a history of who has been in and out of your building whether they have been checked out or are still in the building, people who are in the building beyond the recommended time. Basically gives you full control of who visits your building..


Welcome to Sentinel

Looking for security, automatic audit trail, simplicity and easy storage of guests or vehicles who come in and out of your building/facility/property? Take a look at Sentinel the new customizable and secure based visitor management system designed to manage access to buildings by guests, tenants and vehicles. Visit centuria.co.ke to get a feel of what it is about.