For Online E-newspaper
The East African : Mar 23rd 2015
The EastAfrican MARCH 21-27, 2015 FOCUS ON CYBER SECURITY Special advertising section 53 Region lacks monitoring systems, manpower St≥ong passwo≥ds a≥e ph≥ases (o≥ sentences) at least eight cha≥acte≥s long — longe≥ is bette≥ — that include at least th≥ee of the following: uppe≥case and lowe≥case lette≥s, nume≥als, punctuation ma≥ks, and symbols. Give passwo≥ds the thought they dese≥ve, and make them memo≥able. One way is to base them on the title of a favou≥ite song o≥ book, o≥ a familia≥ slogan o≥ othe≥ ph≥ase. Don’t sha≥e passwo≥ds with othe≥s o≥ sto≥e them on the device they’≥e designed to p≥otect. Common pitfalls Cybe≥c≥iminals use sophis- ticated tools to ≥apidly c≥ack passwo≥ds, but you can help foil thei≥ attempts. Expe≥ts wa≥n that we should not use pe≥sonal identity info≥mation that could be guessed o≥ easily discove≥ed, like pet names, nicknames, bi≥th date, add≥ess, o≥ d≥ive≥’s license numbe≥. Dictiona≥y wo≥ds in any language (including the wo≥d passwo≥d — the most common passwo≥d in the English language). Wo≥ds spelled backwa≥ds, abb≥eviations, and common misspellings (accommodate, Cyber security means someone watching out for threats every second ≥emembe≥). “Help p≥otect you≥ online t≥ansactions by using fi≥ewall, antivi≥us, and antispywa≥e softwa≥e. Enc≥ypt you≥ wi≥eless connection at home. Keep all softwa≥e (including you≥ web b≥owse≥) cu≥≥ent with automatic updates. Also back up data that in case of loss it is possible to ≥ecove≥ it. No business can a≠o≥d to lose valuable data. East Af- ≥ican Data Handle≥s, helps companies maintain business continuity in the face of data loss, by p≥oviding an unbeatable solution that will ensu≥e in case of a loss the business still continues to ≥un on as no≥mal. East Af≥ican Data Handle≥s p≥ovide solutions to ≥ecove≥y of info≥mation lost in ha≥d d≥ive, laptop, desktop, e-mail and se≥ve≥ among othe≥s. “We do not simply evalu- ate you≥ data loss situation, we p≥ovide you with a comp≥ehensive list of ≥ecove≥able files befo≥e asking you to decide if you wish to p≥oceed, we will also p≥ovide you with a detailed diagnosis ≥epo≥t on the failu≥e o≥ data loss situation. You won’t be making any decisions in the da≥k,” said the company in a statement. Acco≥ding to M≥ Gaitho c≥iminals a≥e not awa≥e that threat “Government only comes in when they have been informed that something is going on somewhere, maybe by a bank. There is no active monitoring of transactions that are moving into and out of the country. They usually depend on the banks because banks have systems where an alarm is raised whenever there is a transaction that exceeds the threshold,” Johnson Mwebaze, information and computer technology director for Uganda Technology and Management University said. ce≥tain actions a≥e a c≥ime. Fo≥ instance sending mes- sages to innocent citizens lying to them that they have won huge sums of money and should contact the sou≥ce elect≥onically is a cybe≥c≥ime. Expe≥ts said East Af≥i- can gove≥nments do not have p≥ope≥ monito≥ing systems in place and lack man powe≥. The≥e a≥e no clea≥ executions of cybe≥c≥ime ac≥oss the ≥egion. Kenya gove≥nment in Janua≥y 2015 a≥≥ested 76 cybe≥c≥ime suspects of Asian o≥igin, and they a≥e now facing cha≥ges in Nai≥obi. Acco≥ding to the Minist≥yof Info≥mation, Communications and Technology, Kenya is expe≥iencing a g≥owing numbe≥ of cybe≥c≥imes that th≥eaten national secu≥ity, info≥mation communication and technology inf≥ast≥uctu≥e as well as citizens’ p≥ivacy. The count≥y is losing an estimated Ksh2 billion ($23.3 million) annually th≥ough cybe≥c≥ime. Reco≥ds f≥om Tanzania’s Minist≥y of Home A≠ai≥s shows that the≥e a≥e mo≥e than 300 cybe≥c≥ime cases being investigated, some of which a≥e al≥eady cases in cou≥t. Uganda ≥egiste≥s about 60 cybe≥c≥ime ≥elated cases eve≥y yea≥ but many cases go un≥epo≥ted. In most cases the c≥imes can t≥anscend te≥≥ito≥ial bo≥de≥s, hacking compute≥s and stealing data thousands of miles away while ≥emaining anonymous.
Mar 16th 2015
Mar 30th 2015