SlideShare a Scribd company logo
1 of 24
Download to read offline
HACK IT
CONSULTANCY
We secure what matters the most to you
Who am i
• Mchatta Kharim
• CEO at HACK IT Consultancy
• Half a decade of experience in
cybersecurity and digital forensics
• My experience revolves around
various industries including
financial institutions, education
institution, government institutions,
non-profit organizations,
telecommunication, research
institutes, publication institutes etc
Kenya
• Public Speaking
• Training
• CTF Competition
• Mentor
Tanzania
• Public Speaking
• Training
• CTF Competition
• Digital Forensics
• Penetration Testing
• Curriculum Creation
• Public Speaking
Egypt
• Public Speaking
• Public Speaking
Morocco
Rwanda
• Public Speaking
Nigeria
• Penetration testing
Ghana
• Penetration testing
• Public speaking
South Africa
• Penetration testing
Benin
Uganda
• Public Speaking
Experience in Africa
Experience in USA & Europe
• Penetration Testing US Department
of Defense
United States of America
UK
• Author at eForensics
Magazine
• Author at PenTest
Magazine
• Penetration testing
( Research Institute)
Poland
Germany
• Subject Matter Expert
(DW Swahili)
CYBER THREATS IN AFRICA
Todays talk will be around:
Definitions
- what is cybersecurity
- what is cyber threat
Measures against cyber threats
Factors that led to the increase of cyber threats
- Covid 19
- Digital economy
- examples of cyber threats prominent in Africa
What is Cybersecurity
Hacker
Virus/worms
PC Database Applications
Anti-virus
Firewall
Organization
Security
Thief
PROTECTING
From unauthorized access
From Malicious program
From unauthorized access
CYBER THREATS IN AFRICA
What are cyber threats?
Hacking Phishing Ransomware Viruses
These are program that cause damage to systems and networks, Here are some of the
threats that organizations are exposed to
IdentityTheft/
impersonation
Damage of company
service network
Insider’s
Website dephasing
Data breach
CYBER THREATS IN AFRICA
Factors that accelerated cyber threat growth in Africa
1. Pandemic (COVID 19)
CYBER THREATS IN AFRICA
CHINA
In December 2019 WHO reported the first outbreak of Covid 19
On 30th Jan 2020, the virus was announced as a global pandemic and part of
counter measures On stopping the virus lockdown started worldwide.
What did this mean?
CYBER THREATS IN AFRICA
Increase on number of
cyber threats
New way of working
(remote working/working
from home)
Increase in number of online users.
In 2021 43% of Africans had access
to the internet
Lead to the
Lead to the
Factors that accelerated cyber threat growth in Africa
2. Digital Economy
CYBER THREATS IN AFRICA
Largest Digital Economy Countries Worldwide
USA
CHINA
JAPAN
GERMANY
UK
Factors that accelerated cyber threat growth in Africa
CYBER THREATS IN AFRICA
S. Africa
Kenya
Nigeria
African Countries leading in the digital economy
Factors that accelerated cyber threat growth in Africa
CYBER THREATS IN AFRICA
What is the digital economy?
Business Business Process
Technology
Integration into
Cloud comp.
AI
IOT
Networking
Tools
Communication Employee’s
Customer’s Data
The goal is to revolutionize the way business's function and thrive.
What did this mean?
CYBER THREATS IN AFRICA
Business Process
Technology
into
Business
Lead to the increase of
System hacks
Services not
available
Data breach
Data loss
(crushed server)
Malicious
programs
Damage of
company assets
Cyber threats
Leading cyber threats in Africa
CYBER THREATS IN AFRICA
Social Engineering
(Phishing,Vhishing & Smishing)
Website dephasing
Denial of service
Malicious programs (ransomware)
Cyberespionage and data leak
Credential compromise
Vulnerability exploitation
Example of vhishing
CYBER THREATS IN AFRICA
Example of phishing
CYBER THREATS IN AFRICA
Targets of cyber criminals
CYBER THREATS IN AFRICA
Targets of cyber attacks and their success rate percentile
CYBER THREATS IN AFRICA
Consequence of cyber attacks and their success rate percentile
CYBER THREATS IN AFRICA
CYBER INCIDENCE IN
AFRICA
Cyber attack cases
CYBER THREATS IN AFRICA
Kenya
1.Anonymous sudan hacked
- e-citizen
- financial institutions, mpesa
- kenya power
- National Transport & SA
- kenya railways
1. Basic education certificate
examination hacked; website changed
to casino like platform
2. Government website hacked by
alsancak (Turkish)
3. Electric company of Ghana hacked
Ghana
2. Medusa hacked
- Kenya Airport Authority
- Naivas
- Jubilee Insurance
Counter measures
CYBER THREATS IN AFRICA
PerformVAPT
Train employee’s and perform cyber drills
Keep up to date with the cyber trends
Patch systems regularly
Implement security postures
Have a security operation center (SOC)
use a strong password
Enable 2FA
Counter measures
CYBER THREATS IN AFRICA
ANY QUESTION?
Author: Kharim Mchatta
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy
Instagram: @hackitconsultancy

More Related Content

Similar to Cyber threat in Africa | 2023

Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Brad Deflin
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer Self
 
Ashley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
Ashley Pillay- Navigating Through Cyber Security During a Cyber PandemicAshley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
Ashley Pillay- Navigating Through Cyber Security During a Cyber Pandemicitnewsafrica
 
Business intelligence and global access through e marketing
Business intelligence and global access through e marketingBusiness intelligence and global access through e marketing
Business intelligence and global access through e marketingSufi Nouman Riaz
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022KharimMchatta
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023KharimMchatta
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastMOTC Qatar
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceMoses Kemibaro
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"ChristiAKannapel
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityCareer Communications Group
 

Similar to Cyber threat in Africa | 2023 (20)

Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
Ashley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
Ashley Pillay- Navigating Through Cyber Security During a Cyber PandemicAshley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
Ashley Pillay- Navigating Through Cyber Security During a Cyber Pandemic
 
Business intelligence and global access through e marketing
Business intelligence and global access through e marketingBusiness intelligence and global access through e marketing
Business intelligence and global access through e marketing
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Bright future ahead in Cybersecurity
Bright future ahead in CybersecurityBright future ahead in Cybersecurity
Bright future ahead in Cybersecurity
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for ResilienceBuilding Cybersecurity Ecosystems in Africa: A Prescription for Resilience
Building Cybersecurity Ecosystems in Africa: A Prescription for Resilience
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training Summary
Security Awareness Training SummarySecurity Awareness Training Summary
Security Awareness Training Summary
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 

More from KharimMchatta

Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021KharimMchatta
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022KharimMchatta
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022KharimMchatta
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022KharimMchatta
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021KharimMchatta
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021KharimMchatta
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021KharimMchatta
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021KharimMchatta
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021KharimMchatta
 

More from KharimMchatta (10)

Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Cyber threat in Africa | 2023

  • 1. HACK IT CONSULTANCY We secure what matters the most to you
  • 2. Who am i • Mchatta Kharim • CEO at HACK IT Consultancy • Half a decade of experience in cybersecurity and digital forensics • My experience revolves around various industries including financial institutions, education institution, government institutions, non-profit organizations, telecommunication, research institutes, publication institutes etc Kenya • Public Speaking • Training • CTF Competition • Mentor Tanzania • Public Speaking • Training • CTF Competition • Digital Forensics • Penetration Testing • Curriculum Creation • Public Speaking Egypt • Public Speaking • Public Speaking Morocco Rwanda • Public Speaking Nigeria • Penetration testing Ghana • Penetration testing • Public speaking South Africa • Penetration testing Benin Uganda • Public Speaking Experience in Africa
  • 3. Experience in USA & Europe • Penetration Testing US Department of Defense United States of America UK • Author at eForensics Magazine • Author at PenTest Magazine • Penetration testing ( Research Institute) Poland Germany • Subject Matter Expert (DW Swahili)
  • 4. CYBER THREATS IN AFRICA Todays talk will be around: Definitions - what is cybersecurity - what is cyber threat Measures against cyber threats Factors that led to the increase of cyber threats - Covid 19 - Digital economy - examples of cyber threats prominent in Africa
  • 5. What is Cybersecurity Hacker Virus/worms PC Database Applications Anti-virus Firewall Organization Security Thief PROTECTING From unauthorized access From Malicious program From unauthorized access CYBER THREATS IN AFRICA
  • 6. What are cyber threats? Hacking Phishing Ransomware Viruses These are program that cause damage to systems and networks, Here are some of the threats that organizations are exposed to IdentityTheft/ impersonation Damage of company service network Insider’s Website dephasing Data breach CYBER THREATS IN AFRICA
  • 7. Factors that accelerated cyber threat growth in Africa 1. Pandemic (COVID 19) CYBER THREATS IN AFRICA CHINA In December 2019 WHO reported the first outbreak of Covid 19 On 30th Jan 2020, the virus was announced as a global pandemic and part of counter measures On stopping the virus lockdown started worldwide.
  • 8. What did this mean? CYBER THREATS IN AFRICA Increase on number of cyber threats New way of working (remote working/working from home) Increase in number of online users. In 2021 43% of Africans had access to the internet Lead to the Lead to the
  • 9. Factors that accelerated cyber threat growth in Africa 2. Digital Economy CYBER THREATS IN AFRICA Largest Digital Economy Countries Worldwide USA CHINA JAPAN GERMANY UK
  • 10. Factors that accelerated cyber threat growth in Africa CYBER THREATS IN AFRICA S. Africa Kenya Nigeria African Countries leading in the digital economy
  • 11. Factors that accelerated cyber threat growth in Africa CYBER THREATS IN AFRICA What is the digital economy? Business Business Process Technology Integration into Cloud comp. AI IOT Networking Tools Communication Employee’s Customer’s Data The goal is to revolutionize the way business's function and thrive.
  • 12. What did this mean? CYBER THREATS IN AFRICA Business Process Technology into Business Lead to the increase of System hacks Services not available Data breach Data loss (crushed server) Malicious programs Damage of company assets Cyber threats
  • 13. Leading cyber threats in Africa CYBER THREATS IN AFRICA Social Engineering (Phishing,Vhishing & Smishing) Website dephasing Denial of service Malicious programs (ransomware) Cyberespionage and data leak Credential compromise Vulnerability exploitation
  • 14. Example of vhishing CYBER THREATS IN AFRICA
  • 15. Example of phishing CYBER THREATS IN AFRICA
  • 16. Targets of cyber criminals CYBER THREATS IN AFRICA
  • 17. Targets of cyber attacks and their success rate percentile CYBER THREATS IN AFRICA
  • 18. Consequence of cyber attacks and their success rate percentile CYBER THREATS IN AFRICA
  • 20. Cyber attack cases CYBER THREATS IN AFRICA Kenya 1.Anonymous sudan hacked - e-citizen - financial institutions, mpesa - kenya power - National Transport & SA - kenya railways 1. Basic education certificate examination hacked; website changed to casino like platform 2. Government website hacked by alsancak (Turkish) 3. Electric company of Ghana hacked Ghana 2. Medusa hacked - Kenya Airport Authority - Naivas - Jubilee Insurance
  • 21. Counter measures CYBER THREATS IN AFRICA PerformVAPT Train employee’s and perform cyber drills Keep up to date with the cyber trends Patch systems regularly Implement security postures Have a security operation center (SOC) use a strong password Enable 2FA
  • 24. Author: Kharim Mchatta Email: info@hackitconsultacy.com Website: www.h4k-it.com LinkedIn: hack it consultancy Instagram: @hackitconsultancy