There is a common misconception that the most dangerous threats to encounter on modern users’ digital journeys are likely to appear during Internet surfing. The reality however, based on the most recent analysis of cyberattacks in South Africa, Kenya and Nigeria within 2020 by Kaspersky experts, demonstrates that users are in fact more likely to face malware related attacks hidden within their devices.
Such threats are classified as ‘local’, which means they are detected either on users’ devices or on portable data storage devices, such as flash drives. In 2020, 25% of Kaspersky private users in South Africa, 40% in Kenya and 38% in Nigeria were attacked by such threats. To provide a comparison, web attacks only affected 9% of users in South Africa, 11% in Kenya and 8% in Nigeria.
When looking at corporate users in these regions, the numbers are similar: 23% of corporate users in South Africa, 29% in Kenya and 35% in Nigeria encountered such local threats within 2020.
Unfortunately, there has been an increase in the sophistication of such threats – which may be hiding on the user’s device within a seemingly legitimate file for a while, to fly under the radar and only strike later.
To protect against cyberthreats including malware, Kaspersky recommends keeping to the following guidelines:
- Do not follow dubious links from letters, messages in instant messengers or SMS
- Regularly install updates for the operating system and applications
- Install applications only from official stores
- Use complex and different passwords for accounts
- Regularly copy important data from your device to the cloud, to a USB flash drive or hard drive
- Do not give applications access to those functions that they do not need
- Install a reliable security solution such as Kaspersky Internet Security
In addition, companies are encouraged to provide training to improve cyber literacy among their employees. For example, the automated platform Kaspersky ASAP helps to develop safe behaviour skills and form sustainable cybersecurity habits. The solution allows the company to assess the current knowledge of an employee in the field of cybersecurity and in accordance with this, determine the set of skills that the employee needs, depending on job duties and risk profile and build a timetable for the program.Click below to share this article