How have you ever come across a short message SEND TO THIS NUMBER or DISTRIBUTE THIS MESSAGE TO 20 PEOPLE TO WIN A CERTAIN AMOUNT OF MONEY? The Swahili people say these words are not new to the city, maybe for the foreigners of these things...
In recent years, cyber theft has increased rapidly in Tanzania. Although the government and various organizations have made efforts to provide education about cyber security, many still do not have enough understanding about how to protect themselves from cyber threats. Many people are facing problems such as theft of money through mobile phone services, hacking of social media accounts, and losing their personal information due to weak online security.
The basics of cyber security are being aware of the risks, taking precautions, and having the knowledge to improve the security of your information.
Here are some real examples of cyber threats and steps to protect yourself:
1. FINANCIAL THEFT THROUGH CELL PHONES
Financial theft through mobile phone services like M-Pesa has become a big challenge in Tanzania. Criminals use "SIM swap" and "phishing" techniques to steal customers' money. In "SIM swap," the criminal uses personal information, such as a photo ID, to change the victim's phone number and then use financial accounts to easily send money.
According to the report of the Central Bank of Tanzania (BoT) in 2022, it showed that the theft of money through mobile phone services increased by 15 percent. Many people were victims of these attacks because they did not know the risks associated with the use of mobile phones.
2. PHISHING AND HACKING OF SOCIAL MEDIA ACCOUNTS
Hacking of social media accounts, such as Facebook and Instagram, has continued to be a major problem. Criminals send phishing links or emails impersonating legitimate institutions, such as banks or banking services, in order to obtain personal account information, steal money, or use that information for criminal purposes. Through the Tanzania Communications Regulatory Authority (TCRA) Report of 2021, it showed that many Tanzanians agreed to give their financial information online, which led to a large theft of money and personal information.
3. PROTECTION OF PERSONAL INFORMATION AND DATA
As in other parts of the world, the protection of personal information is a sensitive issue. Many people are using internet services without taking enough precautions, such as using weak passwords or passwords or not ensuring the security of their accounts using modern security technologies.
According to a study conducted by Cyber Security Tanzania (CST) in 2023, it showed that 70 percent of Tanzanians use passwords (PASSWORD) such as "12345" which puts them in cyber attacks such as "brute force attacks."
4. DEFENSE STRATEGIES
• Use of Two-Factor Authentication Controls: This is an important way to increase the security of your social media accounts and financial services. The Tanzania Communications Authority (TCRA) noted that the use of two-factor authentication (2FA) is an effective method to reduce the risk of hacking.
• Cyber Security Education through the Cyber Security TanzaniaCyber SecurityAwareness Campaign which was initiated by the Tanzanian government to educate citizens about the importance of cyber security. This education helps to raise awareness about the risks associated with the use of social networks and online financial services.
The protection of your information is our responsibility. Even as governments and technology organizations continue to provide education and protection strategies, each of us should be responsible for knowing cyber risks and taking steps to protect ourselves. By using security strategies like two-factor authentication, avoiding hacking links, and using strong passwords, we can reduce the effects of cyber threats. Cyber security is not just the responsibility of corporations and governments; it is the responsibility of all of us.

0 Comments