About Us

Zimbabwe Cyber Security Association

Our Mission

ZimbabweCyberSecurityAssociation (ZCSA) offers a variety of offensive and defensive Cyber Security services, too simply name a few Penetration Testing, Encryption Services, Computer\Mobile Forensic Investigators. We thrive on excellence ensuring that our staff are fully qualified at handling any cyber security threats and providing excellent services for our customers. Our team believes in the sanctity of privacy and security in our businesses or personal lives, we are here to ensure that no entity encroaches that.

The Company and Management

Zimbabwe Cyber Security Association (ZCSA) is headquartered in Strathaven, Harare. The company is owned by founder Tatenda S. Nyere. Zimbabwe Cyber Security Association has extensive experience in the Information Technology department, which a minimum of 10 years as a cyber security expert..

The management of Zimbabwe Cyber Security Association (ZCSA) consists of co-owners Tatenda S. Nyere and John Chakauya, who are both certified ethical hackers, computer\mobile forensic investigators and hold other qualifications. Both partners will be taking hands-on management roles in the company. In addition, we have assembled a group of advisors to provide wide range of expertise. The advisors are:

Tinashe Matyoramhinga, Networking expert, Ethical Hacker

Phoebe Chakaodza, Programmer, Web Developer Expert

Malcolm Vambe, Computer Languages Expert

Alvin Kandeya, Mobile Applications, programmer


Growing Cyber Threat in Zimbabwe

The Market

Across Zimbabwewe expect cyber security to have an explosion of growth over the next few years. Statistics provided by Postal &Telecomunications Regulatory Authority of Zimbabwe (POTRAZ) show that Zimbabwe has witnessed significant growth of the internet, with figures showing a penetration rate of 50% in 2016, Furthermore, on 30 June 2017, the total number of internet subscriptions was 6,668,155 (POTRAZ, 2017) and another report by POTRAZ (2016) shows Zimbabwe now has 12,878,926 mobile phone subscribers. These numbers show that there is a growing market for Internet use and Zimbabwe is adapting technologically, thus laying a foundation for threats that come with such advancements namely hackers, or simply the millions of trojans, viruses, phising scams on the internet.

Zimbabwe has suffered numerous cyber security breaches on various institutions but mostly in government departments. According to the Reserve Bank of Zimbabwe (RBZ 2015), cybercrime is listed as one of the crimes contributing to the US$1, 8 billion estimated illicit proceeds generated from criminal activity annually in Zimbabwe. Between 2011 and 2015, about 140 cases of cybercrimes were reported and these include; Phishing (20); Credit Card Fraud (13); Identity Theft (10); Unauthorized Access (24); Hacking (72); and Telecommunications Piracy (1). These statistics are evidence of Zimbabwe’s vulnerability to computer and cybercrimes and thus the pressing need for cyber security experts.

Real People. Real Solutions

Affordable, Fast & Reliable. Had lost most of my data through corrupt hard-drives. They recovered everything for me.

Edward Chikova Head of IT ArmadiloSecurity

All my systems have been protected and i get live updates when i start weird traffic through my website, Thank You Zimbabwe Cyber Security Association.

Tatenda Muringa Manager @ Muringa Accountants

Knowing our threat posture as it happens, means my team can get on the front foot and protect the business from data loss in real-time, before it happens

Emil Chigu CEO @ AssegaiNutrition

Zimbabwe Cyber Security Association provides us with true security management capabilities that meet the stringent real-time performance, reliability and scalability of our mission-critical role secure IT infrastructure.

Albert Chari Managing Director @ Country Surveying

What we are about

We pride ourselves has a company that protects the privacy and security of people whether it is for your business or your home, therefore we have a wide range of experts, to make sure we meet and fulfill the requirements of our customers. This includes

Since our services offer :

  • Penetration Testing
  • Computer\Mobile Forensics
  • Intrusive Detection Systems &Host Based Intrusive Detection system
  • Website\Mobile application Development
  • Private & Secure email services (untraceable &unhackable)
  • Software Distribution
  • Encryption Services
  • Setting up Honeypots

Ready To Work With Us? Return to Homepage