Cyber-attacks: What, Why & How
Busola is a Data Analyst, Market Researcher and Consumer Behaviour…
In Q4 of 2021, there were an astonishing 1,353 cyber-attacks weekly in Africa, in comparison to an average of 925 cyber-attacks in the world.
Cyber-attack is a form of digital assault using computers, networks, or devices with access to the internet; directed towards other computers, networks, or devices with access to the internet which threatens public safety, national security, and economic security. Cybercriminals usually compromise systems and steal financial, property, and/or intellectual property such as business or customer financial details, sensitive personal identifying information, customer/employee emails, databases, and so on.
As internet penetration is increasing, and more and more people are interconnected through the digital world, there is an increase in cyber-attacks. Examples of typical cyber-attacks are email compromise, identity theft, ransomware, phishing, online predators, and espionage. These attacks damage computer hardware and network, give unauthorized access to data, and in some cases physically harm people.
In order to protect your business or yourself, it is important to have a comprehensive security plan and infrastructure that offers protection. Out of 182 countries, Nigeria ranks 47th on the 2020 Global Cybersecurity Index with about 84.76% of measures taken to ensure protection. Mauritius, the highest-ranked in Africa and the 7th ranked in the world, has taken about 96.89% of measures to ensure protection.
So what exactly can be done to protect yourself?
- Use strong passwords that are reviewed and changed at least quarterly
- Update your software frequently and/or have automatic updates activated
- Turn on and use multi-factor authentication
- Apply firewalls and IPS
- Have segmented networks
- Be cautious before you click on links or download attachments
- Most importantly educate yourself, your family, colleagues about cybersecurity
Most cyberattacks come from email compromise, if the email sounds too good to be true, it probably is, therefore do not click nor download, just hit delete.
Contact Versa Research your trusted data, research & consulting partner!
References
https://techpoint.africa/newsletter/techpoint-digest-236/?utm_source=mailster&utm_medium=email&utm_term&utm_content&utm_campaign=techpoint Africa digest
https://preview.mailerlite.com/t8e9n4e2t5/1862154675466279540/l5f7/
https://www.fbi.gov/investigate/cyber
https://www.ibm.com/topics/cyber-attack
https://www.nibusinessinfo.co.uk/content/reasons-behind-cyber-attacks
https://guardian.ng/technology/nigeria-lags-behind-mauritius-ghana-others-in-cybersecurity-ranking/