By Global I-Tech, Powered by Smart
The Political seasons in many countries, in recent times, have been characterised by cyber-attacks of varied proportions and sophistication which present a high risk to both individuals and organisations.
Employees are the first line of defense against cyber threats in the workplace. A distracted employee could thus be the weakest link when it comes to exposing your organisation organization to cyber threats.
According to a Centrify survey, people who get bored and distracted at work are more likely to make mistakes and pose a security risk. The report notes that 35% of survey participants identified distraction and boredom as the primary contributors to human mistakes. Heavy workloads (19%), numerous policies and compliance laws (5%), social media (5%), and password sharing were further contributing factors (4 %).
When it comes to distractions, it's understandable that workers would become sidetracked with the Kenyan general election day rapidly approaching given how emotionally intense this time of year is. It is possible for businesses to maintain their cyber security throughout such times. Everyone involved in the organization's cyber security must understand that the threat landscape is constantly expanding.
The cost of cybersecurity
Recent information from the Communications Authority of Kenya (CA) reveals that the number of cyber threats has more than doubled in the current fiscal year, which began in July 2021. 359.2 million threats were reported by the Authority, an all-time high, up 133% from the 110.9 threats recorded in 2019 and the 154.4 million threats recorded in FY2020–21.
Businesses might suffer catastrophic losses as a result of the threat landscape's ongoing expansion, especially in terms of lost financial resources. Increased cyber security threats cost the Kenyan economy over Ksh. 29.5 billion (USD 295 million) in 2018, according to research by the Pan-African cyber-security and business consultancy Serianu.
Managing the losses
How therefore can businesses prevent their business from failing as a result of a distracted employee? While we would like to offer a universally applicable answer, none exists. In the case of Smart Applications Group, it is the Infrastructure and Security department's responsibility to make sure everyone is doing their part to keep the company safe.
“The Infrastructure and Security department has created this cybersecurity checklist for you in protecting against malicious actors who might want to take advantage of this season to cause disruption and financial loss”, notes Juna Joshua, Regional Infrastructure and Security Manager, Smart Applications Group.
Use two-factor authentication (2fa)
Implement strong password practices
Enable auto-update to install security patches in a timely manner
Use encrypted messaging apps or systems when necessary
Have a plan to quickly respond to cyber incidents
Secure work and personal devices
Beware of phishing attempts
Protect yourself from phishing attacks:
“This is not an exhaustive list, as good security requires constant attention based upon evolving risk. Implementing these protocols, and instilling a culture of digital vigilance, will put you and your team in the best position to protect yourself against cyber incidents.” Juna continued.
Since people are what make a firm run, it is crucial for each employee to take care of themselves both before and after work hours, in Juna's opinion. This is because the human element of defending an organisation does not only stop at the office. Here are a few examples of how Juna suggests staff members conduct themselves throughout the election season.
Would you like to learn more about maintaining the online security of your company? Reach out to us as we offer our clients professional guidance on the best and most efficient systems to utilize in their businesses.
Talk to us on:
Tel: +254 20 320 6000, +254 709 326 000
WhatsApp: +254 718 222 000
No part of this publication may be reproduced, distributed, transmitted or in any form or by any means including photocopying, recording or other means electronic or mechanical, without prior written permission of the publisher, except in the case of brief quotations, embodied in reviews and certain other non-commercial uses permitted in the copyright laws.
Global I-Tech Magazine. Copyright © 2022. All Rights Reserved. Smart Applications International