Close Menu
  • Briefing
    • Cover Story
    • Latest News
    • Counties
  • Politics
    • Society
  • Special Reports
    • Companies
    • Enterprise
    • Money
    • Technology
  • Columns
  • Dispatches from China
  • Member Content
    • Shop
  • Contact Us
    • About us
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram LinkedIn
Nairobi Business Monthly
Subscribe
  • Briefing
    • Cover Story
    • Latest News
    • Counties
  • Politics
    • Society
  • Special Reports
    • Companies
    • Enterprise
    • Money
    • Technology
  • Columns
  • Dispatches from China
  • Member Content
    • Shop
  • Contact Us
    • About us
Nairobi Business Monthly
Home»Technology»Protecting yourself from phishing attacks
Technology

Protecting yourself from phishing attacks

EditorBy Editor5th January 2017Updated:23rd September 2019No Comments3 Mins Read
Facebook Twitter WhatsApp Telegram Email
Share
Facebook Twitter WhatsApp Telegram Email

The country currently records an estimated 3, 000 successful or failed attacks every month as per ICT governance organization ISACA, formerly known as (Information Systems Audit and Control Association).

Social engineering, which is the psychological manipulation of someone to inadvertently divulge confidential information is one of the main feeder tactics that cyber-criminals rely on to target both individuals and organizations.

One tool in social engineering is phishing. This is a form of identity theft where cybercriminals try to obtain private details such as usernames, passwords, and credit card details by masquerading as a trustworthy entity. Often delivered via emails, it is an improved version over the old methods that relied on phone calls and physical letter scams.

The Nairobi Law Monthly September Edition

Phishing attacks are typically deployed post-breach, where criminals may send out warnings to users advising them to change their passwords (but directing them to a fake website to harvest their details). Often, phishing attacks act as easy gateways into an enterprise’s network for the cybercriminals to launch more sophisticated attacks.

People abreast with cyber insecurity say that phishing attacks are a big problem because users by nature are gullible hence a soft target for cyber-criminals. According to Internet security solutions company, ESET East Africa, one can still stay safe and better protected through some basic proactive measures.

Be sensible and smart

Plenty of phishing emails are obvious, often phrased in an impersonal greeting or featuring implausible and generally surprising content. You are likely to come across numerous typos, mismatched words and mixed caps. Some of these mistakes are intentional to try and hoodwink spam filters, while weeding out ‘smart’ recipients who may not fall for the con.

If an email looks suspicious you are better off reading and re-reading and even confirming with the source. A reputable company will very rarely require you to do something urgently, for example on the pretext of avoiding fines or other punitive effects. However, this is an exception to the rule; usually, threats and urgency – especially if coming from a legitimate company source – are a sign of phishing.

When using social media, be wary of shortened links as provided by the various shortening services, so as not to inadvertently land on a fake website. A simple technique to confirm a legitimate or fake web link is to mouse over the link to see if it points to the one that appears in the email text. You can open a new browser window if in doubt, and type the URL that you know and are familiar with into the address bar. Cybercriminals may use these “fake” sites to steal your entered personal details. Or, may carry out a drive-by-download attack, thus infesting your device with malware.

One great innovation is the possibility to browse via a secure website (indicated by https:// and a security “lock” icon in the browser’s address bar). This is particularly important when submitting sensitive information online, such as credit card details.

For activities such online banking or shopping, you should never use public (unsecured) Wi-Fi. A better alternative would be to rely on your mobile phone service provider’s 3/4G or LTE connection.

The Nairobi Law Monthly September Edition
Follow on Facebook Follow on X (Twitter) Follow on WhatsApp
Share. Facebook Twitter WhatsApp Telegram
Editor

Related Posts

CEOs bracing for threat to jobs from AI

1st January 2025

Taking advantage of AI to reduce gap in tech race

27th December 2024

Arrest of Telegram’s founder highlights lack of unified approach in tackling crime

24th September 2024

Judiciary leverages automation to improve service delivery

17th September 2024
Add A Comment

Leave A Reply Cancel Reply

The Nairobi Law Monthly September Edition
Latest Posts

Plan unveiled to shield Kenyans from financial risks

26th June 2025

CAK bans exclusive ISP deals in housing estates

24th June 2025

Visa applicants warned over early appointment scams

24th June 2025

Entrepreneurship can build better tomorrow

23rd June 2025

16 million non-filers spark tax crackdown by KRA

23rd June 2025
The Nairobi Law Monthly September Edition
Nairobi Business Monthly
Facebook X (Twitter) Instagram LinkedIn
  • About Us
  • Member Content
  • Download Magazine
  • Contact Us
  • Privacy policy
© 2025 NairobiBusinessMonthly. Designed by Okii

Type above and press Enter to search. Press Esc to cancel.