---
title: "Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware | DMARC Report"
description: "Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware from DMARC Report explains practical steps for email."
image: "https://dmarcreport.com/og/blog/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware.png"
canonical: "https://dmarcreport.com/blog/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/"
---

Quick Answer

\_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Fkenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Kenya-US%20Cybersecurity%20Collaboration%2C%20Papua%20New%20Guinea%20Data%20Security%2C%20Child%20hospital%20Ransomware&url=undefined%2Fblog%2Fkenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Fkenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Fkenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware%2F&title=Kenya-US%20Cybersecurity%20Collaboration%2C%20Papua%20New%20Guinea%20Data%20Security%2C%20Child%20hospital%20Ransomware "Share on Reddit") [ ](mailto:?subject=Kenya-US%20Cybersecurity%20Collaboration%2C%20Papua%20New%20Guinea%20Data%20Security%2C%20Child%20hospital%20Ransomware&body=Check out this article: undefined%2Fblog%2Fkenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware%2F "Share via Email") 

![Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![Dmarc recor 9933d 150x150](https://media.mailhop.org/dmarcreport/images/2024/09/dmarc-recor-9933d-150x150.jpg) 

> From a product strategy perspective, DMARC reporting is evolving from a security tool to a business intelligence platform, says Brad Slavin, General Manager of DuoCircle. The data in aggregate reports tells you not just who’s spoofing you, but who’s sending legitimate email on your behalf - and whether they’re doing it correctly.

\_According to the [FBI’s 2022 Internet Crime Report (IC3)](https://www.ic3.gov/Media/PDF/AnnualReport/2022IC3Report.pdf), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report

Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-14139">
						<source src="https://media.mailhop.org/dmarcreport/images/2024/07/Kenya-US-Cybersecurity-Collaboration-Papua-New-Guinea-Data-Security-Child-hospital-Ransomware.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H1M49S">1:49</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-14139" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-14139" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-14139" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-14139" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/&t=Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/&url=Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2024/07/Kenya-US-Cybersecurity-Collaboration-Papua-New-Guinea-Data-Security-Child-hospital-Ransomware.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/" class="input-link input-link-14139" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-14139" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-14139” readonly/>

```
					<button class="copy-embed copy-embed-14139" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

_Cybersecurity is gradually becoming a matter of global concern. Nations, big or small, are grappling with cybercrime issues_. Recently, the United States of America and Kenya decided to come together and amp up the level of digital security in Africa. On the other hand, Papua New Guinea, the island nation, has heightened its cybersecurity strategy\*\*. On the other hand, a Chicago-based children’s hospital has been badly affected by a [ransomware](https://dmarcreport.com/blog/understanding-ransomware-as-a-service-raas/) attack.

Here’s your weekly dose of cyber news. Keep reading to stay abreast of the latest cyber news!

## Kenya and the US have come together to offer digital security to Africa!

William S Ruto, the president of Kenya, recently visited the United States. Biden and Ruto have agreed to join hands to amp up the **technological progress in Africa**. The focus will be on [cybersecurity](https://dmarcreport.com/blog/how-to-educate-or-train-employees-on-cybersecurity/) trainings and development of improved defense systems against cyberattacks.

The meeting resulted in Ruto’s commitment to the [Framework For Responsible State Behavior In Cyberspace](https://cyberpeaceinstitute.org/news/advancing-responsible-state-behaviour-in-cyberspace-harms-methodology/#:~:text=Any%20measures%20seeking%20to%20advance,at%20national%20and%20international%20levels.). Biden and Ruto have also agreed to share major and minor threat insights among their partners in the **East Africa region**.

![Gmail dmarc 3](https://media.mailhop.org/dmarcreport/images/2024/07/gmail-dmarc-3-1.jpg) 

Also, an **e-government pilot project**, a private industry collaboration, and a prestigious collaboration between Google and the Kenyan government are on the cards. _Apart from Google, the two technology giants, Cisco and Microsoft, are also getting into partnerships with Kenya_. While Microsoft aims at offering free certifications in cybersecurity, Cisco just inaugurated a brand new cybersecurity training and research center at the University of Nairobi. Microsoft is also planning to invest a significant amount in Kenya towards building modern setup around [cloud services](https://www.citrix.com/glossary/what-is-a-cloud-service.html) and [Artificial Intelligence](https://dmarcreport.com/blog/artificial-intelligence-and-the-serious-threat-of-sophisticated-email-attacks-and-automated-advertising-bots/).

The two global leaders strongly believe that a \*\*fail-proof cybersecurity setup is crucial to developing a robust digital ecosystem.

Of late Kenya has been witnessing a sharp spike in the instances of cyberattacks.

## Papua New Guinea stands ahead with its state-of-the-art data security setup

While other countries are struggling with severe cyberattacks, Papua New Guinea has set an example with its trailblazing **cybersecurity system**. _The island country has made all the heads turn because of its futuristic cybersecurity strategy_.

Papua New Guinea has come up with the [National Data Protection and Governance Policy 2024](https://www.ict.gov.pg/ndgdpp/), which aims at safeguarding the digital landscape in this island nation with their coming of age **policies and frameworks**.

The major element in Papua New Guinea’s cybersecurity strategy is to spread awareness around vigilant and responsible data sharing among **government stakeholders**, agencies, and businesses. The end goal is to create a platform that facilitates the seamless creation of an enhanced [digital ecosystem](https://www.techtarget.com/searchcio/definition/digital-ecosystem) and fosters improved connections among multiple sectors - both private and government.

PNG has actually recognized data as the new currency metaphorically and is working relentlessly towards building a cybersecurity system that is **progressive and visionary**.

Papua New Guinea is also aiming to draft a [Memorandum of Understanding With Japan](https://www.darkreading.com/cyber-risk/japan-runs-inaugural-cyber-defense-drills-with-pacific-island-nations) in order to **enhance ICT cooperation**. The idea is to safeguard their security system with shared innovation and expertise.

Papua New Guinea, with its persistent digital efforts, is striving to become one of the most secure and \*\*well-prepared nations against cybercrimes. Its policies and frameworks are designed to encourage [technological collaboration](https://centerforglobalbusiness.medium.com/technological-collaboration-unlocking-global-innovation-f82272b6de1a) and safe data flow across borders .

_The island nation is continuously working towards improving cybersecurity, thereby proving that the size of a nation has nothing to do with the level of digital preparedness_. It is all about setting the right priorities and building the apt strategies to **enhance security setups**. Implementing strong [email authentication protocols](https://dmarcreport.com/what-is-dmarc/) like [SPF](https://dmarcreport.com/what-is-spf/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [DMARC](https://dmarcreport.com/) significantly mitigates phishing risks.

Papua New Guinea, with its visionary cybersecurity policies, is definitely setting the \*\*bar high for other countries.

## A ransomware attack compromised sensitive medical data in children’s hospital

![What is dmarc](https://media.mailhop.org/dmarcreport/images/2024/07/what-is-dmarc-5327.jpg) 

A whopping [791,000](https://www.darkreading.com/cyberattacks-data-breaches/hundreds-of-thousands-impacted-children-hospital-cyberattack) patients in the Lurie Children’s Hospital had their [private data compromised](https://www.aljazeera.com/news/2024/3/31/us-firm-att-says-data-of-73-million-customers-leaked-on-dark-web) because of a ransomware attack on January 26th and 31st, 2024\. The threat actors managed to gain control over the patient portal, medical records, and **communication systems**.

The Chicago-based hospital has informed that a \*\*thorough investigation is going on, and the system has been shifted to offline for the time being. [Sensitive details](https://www.cnbc.com/2024/02/28/biden-executive-order-aims-to-protect-americans-sensitive-data-from-china-russia.html) like name, date of birth, email address, driver’s license number, health plan, medical condition, health claim details, prescription information, telephone number, and social security numbers have been compromised.

The Rhysida ransomware gang has claimed responsibility for the attack. According to the [threat actors](https://cybersecuritynews.com/hackers-deploy-z0miner-malware/), \*\*600 GB of data has already been sold.

The children’s hospital admitted that it had not paid the threat actors any ransom. It claimed that it made this decision after consulting [cybersecurity experts](https://www.khaleejtimes.com/uae/uae-cybersecurity-experts-warn-of-ai-being-used-in-cybercrimes) and professionals. _It believes that paying the ransom does not guarantee the retrieval of the stolen data_.

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ News ](/tags/news/)[ SPF ](/tags/spf/) 

![Vasile Diaconu](https://media.mailhop.org/dmarcreport/images/team/vasile-diaconu.jpg) 

[ Vasile Diaconu ](/authors/vasile-diaconu/) 

Operations Lead

Operations Lead at DuoCircle. Runs project management, developer coordination, and technical support execution for DMARC Report.

[LinkedIn Profile →](https://www.linkedin.com/in/vasile-diaconu/) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 4m  Adidas Data Breach, Whatsapp Image Threat, Silent Ransom Vishing  May 29, 2025 ](/blog/adidas-data-breach-whatsapp-image-threat-silent-ransom-vishing/)[  Foundational 4m  Africa Fights Cybercrime, Attention Farmers Customers, Apple Prevents Threats  Aug 28, 2025 ](/blog/africa-fights-cybercrime-attention-farmers-customers-apple-prevents-threats/)[  Foundational 4m  AI Scam Alert, Federal Cuts Vulnerability, American Tire Cyberattack  Sep 9, 2025 ](/blog/ai-scam-alert-federal-cuts-vulnerability-american-tire-cyberattack/)[  Foundational 4m  Akira flaunts victims, Idaho targets orthodontist, AI granny protects  Nov 22, 2024 ](/blog/akira-flaunts-victims-idaho-targets-orthodontist-ai-granny-protects/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware","description":"Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware from DMARC Report explains practical steps for email.","url":"https://dmarcreport.com/blog/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/","datePublished":"2024-07-03T08:46:55.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2024-07-03T08:46:55.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/vasile-diaconu/#person","name":"Vasile Diaconu","url":"https://dmarcreport.com/authors/vasile-diaconu/","jobTitle":"Operations Lead","description":"Vasile Diaconu is the Operations Lead at DuoCircle, the company behind DMARC Report and AutoSPF. He coordinates between engineering, product, and technical support - running project management, interfacing with developers on customer-reported issues, and making sure work that comes in through the support channel actually gets closed out. Vasile sits at the intersection of customer feedback and engineering execution, giving him a direct view of which email authentication problems customers hit most often in production.","image":"https://media.mailhop.org/dmarcreport/images/team/vasile-diaconu.jpg","knowsAbout":["SaaS Operations","Technical Support Coordination","Customer Issue Resolution","Engineering Program Management","Deployment Operations"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/vasile-diaconu/"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/"},"articleSection":"foundational","keywords":"dkim, DMARC, News, SPF","wordCount":1070,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"Kenya-US Cybersecurity Collaboration, Papua New Guinea Data Security, Child hospital Ransomware","item":"https://dmarcreport.com/blog/kenya-us-cybersecurity-collaboration-papua-new-guinea-data-security-child-hospital-ransomware/"}]}
```
