{"id":3118,"date":"2019-06-17T10:00:58","date_gmt":"2019-06-17T10:00:58","guid":{"rendered":"https:\/\/africasustainabilitymatters.com\/?p=3118"},"modified":"2026-01-11T05:30:21","modified_gmt":"2026-01-11T05:30:21","slug":"cyber-crimes-take-toll-on-sustainability","status":"publish","type":"post","link":"https:\/\/rayscohosting.best\/ASM\/2019\/06\/17\/cyber-crimes-take-toll-on-sustainability\/","title":{"rendered":"Cyber-Crimes Take Toll On Sustainability"},"content":{"rendered":"\n<p>Imagine walking into your favourite hotel for the night, due to modern technology you decide to pay with your credit card but when swiped it declines and the receptionists gracefully tells you that you do not have enough funds. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img fetchpriority=\"high\" decoding=\"async\" width=\"647\" height=\"404\" src=\"https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/crime.jpg\" alt=\"\" class=\"wp-image-3119\" srcset=\"https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/crime.jpg 647w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/crime-300x187.jpg 300w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/crime-585x365.jpg 585w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><figcaption> <br>cyber-crimes: image source: India today.in <\/figcaption><\/figure>\n\n\n\n<p>Well,\nAfrica losses one billion dollars yearly to illicit financial flows. Recent\ncybersecurity research indicated that <a href=\"https:\/\/www.theeastafrican.co.ke\/business\/Africa-loses--3-5b-to-cyber-crime\/2560-4532928-1392g40z\/index.html\">cyber-attacks<\/a>\ncost African businesses 3.5 billion dollars in 2017. This is a big blow to\nAfrica\u2019s development. Nigeria has been a hot spot for major cyber-attacks. Cyber-attacks\nrange from malware attacks, system misconfiguration, web application, online\nand bonnet fraud. In late 2018, a 48-year-old man was arraigned in a Nigerian\ncourt for an attempt to <a href=\"https:\/\/www.theeastafrican.co.ke\/news\/africa\/Nigerian-man-charged-over-email-cash-scam\/4552902-4859422-yqk6d4\/index.html\">defraud<\/a>\npeople by pretending to be the first lady. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-1024x576.jpg\" alt=\"\" class=\"wp-image-3120\" srcset=\"https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-1024x576.jpg 1024w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-300x169.jpg 300w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-768x432.jpg 768w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-1170x658.jpg 1170w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-585x329.jpg 585w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime-1200x675.jpg 1200w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/cy.-crime.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption> <br>image source: pixabay.com <\/figcaption><\/figure>\n\n\n\n<p>A\nstudy by IT services firm Serianu on the amount of money lost by African\ncountries in 2017 to cyber-attacks found that more than 95percent of most African\nbusiness were operating below <a href=\"https:\/\/www.cio.co.ke\/africacybersecurityreport2017-cost-of-cyber-crime-in-africa-2017-estimated-at-3-5-billion\">cyber security\u2019s<\/a>\npoverty line. Most did not have the necessities to protect themselves against\nthe losses. Only four percent of the incidents were reported and only forty\npercent of organizations kept up with the trends in cybersecurity and program\nupdates.<\/p>\n\n\n\n<p>Nigeria\u2019s\neconomy lost an estimated 649 million dollars followed by Kenya which lost 210 million\ndollars. This takes a huge toll on the <a href=\"https:\/\/www.cio.co.ke\/africacybersecurityreport2017-cost-of-cyber-crime-in-africa-2017-estimated-at-3-5-billion\">economy<\/a>\nand most people are not aware of the digital risk in automating of services.\nFor example, Tanzania has online services that allow one to acquire their birth\ncertificate. This makes it easy for someone to impersonate and use personal\ndata to siphon money from people\u2019s accounts.<\/p>\n\n\n\n<p>In\n2016 the ministry of foreign affairs in Kenya experienced what is known as a <a href=\"https:\/\/www.nation.co.ke\/news\/Govt-admits-hackers-stole-data-at-Foreign-Affairs-ministry\/1056-3180962-90t2wyz\/index.html\">social-engineering<\/a>\nattack. This entails playing with the psychology of the victim and getting the\ninformation one needs. The staff was coaxed into giving personal information\nsuch as their email addresses and passwords that were used to tap into\nsensitive data. Prior to this, an Indonesian hacked 100 government websites.<\/p>\n\n\n\n<p>Nearly\nall cyber threats in Kenya detected between July and September in 2018 went <a href=\"https:\/\/www.the-star.co.ke\/counties\/2018-12-20-cyber-threats-now-at-worrying-levels\">unresolved<\/a>.\nThe first quarter reported an approximated 3.82 million <a href=\"https:\/\/www.standardmedia.co.ke\/article\/2001306810\/cases-of-cyber-attack-in-kenya-rise-to-3-8-million\">cyber threats<\/a>\nwhich were a rise from 3.46 million detected between the months of April and June\n2018. The most targeted sector is bank institutions. Recently fake currency in\nBarclays Bank of Kenya was found. Though the real currency was \u2018found\u2019 it makes\nus question the security of our money and transparency in automating services.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1000\" height=\"666\" src=\"https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/hack.jpg\" alt=\"\" class=\"wp-image-3121\" srcset=\"https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/hack.jpg 1000w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/hack-300x200.jpg 300w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/hack-768x511.jpg 768w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/hack-585x390.jpg 585w, https:\/\/rayscohosting.best\/ASM\/wp-content\/uploads\/2019\/06\/hack-263x175.jpg 263w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption> <br>image source: visualhunt.com <\/figcaption><\/figure>\n\n\n\n<p>In\nsuch an environment something needs to be done urgently. Solutions will\nincrease investment opportunities from foreign countries that are withdrawing\nat the moment. African banks are experiencing a lot of loses. As of 2017,\nAfrican banks had lost a total of 248 million dollars to cyber-attack related\nactivities. <\/p>\n\n\n\n<p><strong><em>Can\nthe governments and African banks do more in order to remain secure and at the\nsame time digitalize with the rest of the world?<\/em><\/strong><\/p>\n\n\n\n<p>The\nnumber of <a href=\"http:\/\/www.nairobibusinessmonthly.com\/first-cyber-security-training-and-testing-center-for-sub-saharan-africa\">professionals<\/a>\nin cybersecurity is disturbing Kenya, for instance has less than 1,000 given\nthe total estimated population of 40 million citizens. This sees a majority of\nfirms and organizations lacking the necessary personnel to tackle an issue once\nit emerges. Cybersecurity should be introduced to a majority of the universities\nin Kenya as few offer the course. The course is still foreign yet the country\nis digitalizing most of its services. <\/p>\n\n\n\n<p>A\nmajority of the companies see no need to implement cybersecurity standards\nhence exposed to risk. If the situation is to change the standards implemented\nshould be compulsory to all the organizations. This will help secure most of the\npeoples\u2019 information that is entrusted to a majority of these\ninstitutions.&nbsp; <\/p>\n\n\n\n<p>Banks\nand government institutions need to understand why they are at risk. The\npolitical and economic landscape of some African countries has a role to play\nin this equation. Banks are targeted mostly as they give information that is\ninsufficient in terms of transparency in terms of their business lines and\nactivities undertaken. The more difficult it is to access anti-money laundering\ninformation, the higher the cost of doing business with a specific bank. <\/p>\n\n\n\n<p>Solutions\nsuch as transaction screening can be used to take control sanctions. They do\nthis with maximum accuracy and efficiency.<\/p>\n\n\n\n<p> Data analytics enables banks to manage risk and identify problematic transactions in a more targeted and efficient way. This is done through identification and prioritization on areas that banks wish to investigate deeper. Better information on exposures and a clearer understanding of how networks operate. <\/p>\n\n\n\n<p>With\nfraud moving increasing from data theft to payment fraud, there is a need to\nre-assess the security of their payment environments. Transaction reporting can\nprovide an important layer of quality assurance. It can highlight when suspicious\nactivity takes place. <\/p>\n\n\n\n<p>Cybersecurity\nshould be discussed in the open and people made aware of it. &nbsp;With developments and a lot of money making\nway to the economy, we will need to know it is safe. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine walking into your favourite hotel for the night, due to modern technology you decide to pay with your credit card but when swiped it declines and the receptionists gracefully&hellip;<\/p>\n","protected":false},"author":8,"featured_media":3122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","pagelayer_contact_templates":[],"_pagelayer_content":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[111],"tags":[],"class_list":["post-3118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-responsibility"],"_links":{"self":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/posts\/3118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/comments?post=3118"}],"version-history":[{"count":0,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/posts\/3118\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/media\/3122"}],"wp:attachment":[{"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/media?parent=3118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/categories?post=3118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rayscohosting.best\/ASM\/wp-json\/wp\/v2\/tags?post=3118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}