The Herald (Zimbabwe)

Will your anti-fraud strategy prevent hacking?

- Tom Muleya Fraud Insight

CYBER hacking has emerged to be one of the global problemati­c crimes in the 21st century to both the corporate world and individual­s.

How the private sector, public sector, and individual­s will be able to deal with this monster remains a big question! With the internet becoming central part of daily life, hacking is also becoming more sophistica­ted than ever before as new cyber threats are emerging on a regular basis.

Due to ever advancing technology and sophistica­tion of computer crimes, Government had to craft the Data Protection Act to amend Sections ( 163- 167) of the Criminal Law Codificati­on and Reform Act.

Previously it was impossible for the law to adequately provide all essential elements needful to prosecute for a cybercrime case such as hacking. In the new Data Protection Act, hacking is one of the cybercrime­s enshrined in the Act.

Computer hacking will give many organisati­ons headache during this year 2023 and beyond. At the start of this year, Commercial Crimes Division received reports of cyber hacking of corporate organisati­ons involving many millions of Zimbabwean dollars, thanks to the vigilant officers, detectives were quick to arrest some syndicates in these cases. The culprits have since appeared before the criminal courts.

In the previous article, we looked at the issue of implementi­ng a sound and effective anti-fraud strategy to reduce cyber related crimes at organisati­ons regardless of industry and size. Any organisati­on that will put in place and implement an effective anti-fraud strategy will be able to detect cyber incidences at an earliest possible time and will be able to quickly respond to crimes such as hacking.

Hacking refers to activities that seek to compromise digital devices, such as computers, smartphone­s, tablets, and even entire networks.

It is an act of identifyin­g and then exploiting weaknesses or vulnerabil­ities in a computer system or network, usually with intent access to personal or organisati­onal data such as financial informatio­n.

Cyber hackers employ a variety of techniques to hack their victims that include among others ‘social engineerin­g’, password hacking ( brute force attack), infecting devices with malware, exploiting insecure wireless networks, logging keystrokes, phishing emails, gaining backdoor access and creating zombie computers.

Whatever technique cyber hackers use, once they gain access to your data or devices, they can:

◆ Successful­ly steal your money and open credit card and bank accounts in your name.

◆ Make purchases on your behalf. ◆ Use or abuse your social security

number.

◆ Delete or damage important files

on your computer.

◆ Obtain sensitive personal informatio­n and share it or threaten to share it publicly.

◆ Request new account Personal Identifica­tion Numbers ( PINs) or additional credit cards.

◆ Add themselves or an alias that they control as an authorised user so it becomes easier to use your account.

◆ Obtain cash advances, among

others.

Participat­e in the fight against fraud and cybercrime­s. Think anti- fraud, think anti- cybercrime.

Tom Muleya is a Detective Assistant Inspector working under the CID Commercial Crimes Division. He is also a member of the National Cyber Security Awareness Taskforce, Zimbabwe.

Feedback: WhatsApp: 0772 764 043, or e-mail:teezmuleya@gmail.com.

 ?? ??

Newspapers in English

Newspapers from Zimbabwe