Site icon African Eye Report

Ghosts in the Machine: It’s a spooky digital landscape out there!

Image

South Africa// – 31 October 2023 – Picture the scene. It’s a Halloween Quiz Night, and you and your teammates need to answer True or False correctly on the following questions to win the grand prize.

So here it goes:

  1. True or False: Ninety-five per cent of all data breaches occur due to human error.
  2. True or False:  Seventy-five per cent of all cyberattacks start with an email?
  3. True or False: A cyberattack occurs somewhere in the world every 39 seconds.

Alas, the answers are True, True and True again.

As technology continues to advance, the landscape of cybercrime and cybersecurity threats also evolves. In 2020, the United Nations warned that cybercrime – which includes everything from theft, embezzlement, data hacking and destruction – was up 600 per cent as a result of the COVID-19 pandemic.

According to KPMG’s Africa Cyber Security Outlook of September 2022, one in three organisations in Africa had experienced a cyberattack during the period covered by the survey (2021-2022). These attacks ranged from business email compromise at the top of the list (26 per cent), swiftly followed by ransomware (17 per cent) and data leakage (16 per cent), to denial of service attacks (13 per cent), and many, many more other forms of attacks making up the remaining 28 per cent.

How then do African businesses organise their cybersecurity defences to protect against these cyberattacks? Global strategic technology provider Borwood has put a few suggestions together, brought to you in collaboration with our value-added distribution partner, Exclusive Networks Africa.

Protection against sophisticated attacks

Cybercriminals are becoming more sophisticated and organised, with the advanced tools and technologies that are being used making it more difficult to detect and defend against attacks. Assaults driven by artificial intelligence (AI) can adapt and evolve rapidly, making defence even more challenging. To protect yourself against AI-driven cyberattacks, a combination of proactive measures and ongoing vigilance is required.

Some steps you can take include:

 Ransomware

Ransomware attacks are becoming increasingly prevalent and more sophisticated, with a 37 per cent increase in global ransomware attacks in 2023. These attacks encrypt the victim’s data – so that the organisation or individual is unable to access it, and a ransom is demanded for its release.

Since COVID-19 and the increase of staff working from home, there has been a reported increase of 300 per cent in reported ransomware attacks, according to the FBI in the United States  – with remote workers’ devices and home networks becoming targeted.

Steps you can take to protect yourself from ransomware attacks include:

AI-generated malware

Malware software is used to gain unauthorised access to IT systems, steal data, disrupt services, or cause harm to IT networks. Cybercriminals have started to use AI to create new forms of malware that are highly evasive and challenging to detect by traditional security measures.

Protecting yourself against malware attacks is essential in today’s digital landscape. Here’s how:

Internet of Things

The Internet of Things (IoT) refers to the network of interconnected physical devices and objects that can communicate and exchange data over the Internet. While IoT has the potential to revolutionise various aspects of our lives, it also poses significant challenges when it comes to cybersecurity and cybercrime.

With regards to security around IoT devices, the following best-practice actions are recommended:

Trick or treat? Don’t be tricked…

As children all over South Africa have been tricking or treating for Halloween in 2023, those involved in the IT world – both users, consumers and IT managers – can see very clearly that steps must be taken to beat possible ghosts with ill-intent lurking within IT networks everywhere.

To stay secure in today’s spooky digital landscape, it is essential to stay informed about the latest cybersecurity threats and best practices, as well as regularly updating software, using strong passwords and enabling multi-factor authentication.

Happy Halloween…stay safe!

Exit mobile version