By Juliet Akoth
Nairobi, Kenya: A recent training on digital security for journalists was recently organized by Code for Africa (CFA) in Nairobi. The journalists were taken through thought-provoking sessions that covered pertinent issues such as threats to our digital security, online harassment, how to protect yourself from online threats, and how to report online security incidents to relevant authorities.
Peter Muiruri, a system administrator at Africa AI started off the first session with his detailed presentation on digital space and cybersecurity. According to Muiruri, all internet users must always take extra steps to ensure the safety of their digital assets as there are many threats to sensitive information in the digital space. “Your personal data can be at risk of security threats whether you are using your own laptop or a public desktop computer that has free Wi-Fi that guarantees access to the internet,” he posed.
He noted that many times people sign into their email accounts or services they have subscribed to using these computers. Albeit the problem is not signing in to these accounts but rather forgetting to sign out after completing your tasks. This practice, he said, gives room to other people to see your confidential information especially when using public computers.
“Confidentiality breaches are especially possible if you walk away from a computer without logging out of your account. By logging out, you will have better insight into who is accessing your accounts as only those with the password will be able to log in. However, if you forget to log out, you’ll have less control over who sees your information,” stressed Muiruri.
As per the Hypponen law, if something is smart then it is vulnerable. The following are the other threats to our digital security and smart devices highlighted by Muiruri.
- Malware: Malware is software that is designed to harm a computer system. Malware can take many forms, such as viruses, worms, Trojan horses, and ransomware. Malware can steal your data, encrypt your data, spy on you, or disrupt core computer functions.
- Phishing: Phishing is a type of social engineering attack that is used to trick users into revealing personal information, such as passwords and credit card numbers. It mostly happens through email when suspicious links are sent to the inbox of the recipient. These links can take you to pages that require you to fill in your personal or bank details.
- Data breaches: Data breaches are incidents in which sensitive data is exposed to unauthorized individuals. Data breaches can occur as a result of hacking, insider attacks, or human error.
- Cyberbullying: Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Online harassment
A study by the Pew Research Center dubbed ” The State of Online Harassment’’, reveals that women are more likely to experience harassment than their male counterparts. Online harassment can be defined as the use of information and communication technologies by an individual or group to repeatedly cause harm to another person.
According to award-winning journalist and digital security trainer Lourdes Walusala online violence can take many forms: Body shaming, trolling, hacking, impersonation, threats, non-consensual distribution of intimate images (revenge porn), and abusive comments.
Walusala went ahead and gave her own account of being a victim of impersonation when her Facebook account was hacked by a former close friend of hers who knew her password. After hacking the account, the perpetrator went ahead parading herself as Walusala, asking for money from her community of friends in the name of a funeral contribution since the latter had a close relative who had passed on at the time. She only realized a little too late when the damage had been done through her spouse.
“Most of my friends who had been conned found it hard to believe that the person who asked them for money was not me. They wondered how a digital security trainer could be hacked. I had to repay most of them but they had lost trust in me and to date, some of the friendships remain strained,” confessed Walusala.
In Kenya, many public figures and other internet users have also fallen victim to different forms of harassment in the online space.
Back in 2019, celebrated TikTok star Azziad Nasenya was trolled and bullied after her first encounter with the limelight. She mentioned at one point in one of her past interviews with the media that she was depressed for some time because of the harassment and hateful comments but in the end, the love of family and friends made her rise above the adversity.
How to protect yourself from online threats
The following were proposed ways in which you can keep yourself safe when navigating the online space:
- Use of strong passwords: Strong passwords should be at least 12 characters long and include a mix of upper and lowercase letters, numbers, and symbols.
- Be careful what information you share online: Do not share personal information, such as your Social Security number or bank account number, online unless absolutely necessary.
- Keep your software up to date: Software updates often include security patches that can help protect your computer from malware and other threats.
- Be careful what links you click on: Do not click on links in emails or on websites unless you are sure, they are safe.
- Use a firewall and antivirus software: A firewall can help to protect your computer from
unauthorized access, and antivirus software can help to scan your computer for malware.
- Use encryption software such as a Virtual Private Network (VPN). VPN masks your internet traffic from service providers and malicious attackers. It, therefore, protects your data and identity from prying eyes.
- Be aware of the latest threats: Stay up-to-date on the latest threats to digital security so that you can take them.
Reporting online security incidents
In the final session, a panel discussion that consisted of seasoned digital journalist Waihiga K. Muturi, journalist Nicole Njeri and Winnie Makena, and participants were taken through how to report on incidents online. They emphasized the importance of localizing the report structure, where you can start by reporting the incident to the platform’s report line, then to your local police department.
“It’s advisable to always provide detailed information about the incident, including any evidence you have collected via screenshots, and recordings,” noted Muturi.
In conclusion, digital security is important to all and we must therefore be vigilant and exercise caution to protect ourselves and our information from malicious attackers when navigating the digital space.