NEVER GET BLOCKED AGAIN!
  • Fastest USA IPs in the industry
  • Unrivaled connection strength
  • All application compatible
  • Easy to use software
  • Anonymous browsing

Cyber Criminals Target Workers

African Cyber Risk Institute chairperson, Mr Dziki Nganunu has warned that bank workers were being now targeted by cyber criminals in pursuing cybercrime.

He was talking at the Botswana Institute of Bankers yearly gala dinner under the topic Managing Cyber Fraud Consequences of influence on the Banking Industry in a Technology Informed Age,.

“Data has become rather a precious commodity, if the hacker cannot get to the bank, they are able to get data subsequently use it to get funds,” he said.

He indicated that a large part of the serious assaults emanated from areas of Russia and Eastern Europe due to the problem of idle thoughts made as an effect of joblessness.

“You can picture how all pupils in Information Technology (IT) classes in Botswana, that are jobless with idle thoughts, who are a possible hazard,

He added the problem of low-cost power accessible knowledge, simple to get advice as well as the reality that there was no requirement for a degree to be able to hack because software and passwords may be downloaded even more affordable costs or free of charge.

Mr Nganunu said because there clearly was a method to conceal the IP addresses and place, the other facet, particularly the serious cyber fraud, was anonymity.

“There’s a truly serious offense called cyber fraudsters, who make use of the dark internet, making it impossible to track action through its use,” he said.

He said hackers were worried that there was no legal framework to be able to fight the crime and if thus, there was demand for police and judiciary.

Mr Nganunu yet said Botswana was working on creating a data protection law.

Additionally, he implored bank staffs, senior management, board members to know about the risks that were ever changing.

He also supported them to design and execute robust cyber security policies, which he said must comprise use of the latest social networking by workers, both inside and outside work, profile workers who had access to vital systems and data in addition to market code of ethics at IT training institutions.

by admin on October 28th, 2015 in Hacker attack, Network Security

There are no comments.

Name: Website: E-Mail:

XHTML: You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
Show Buttons
Hide Buttons