Cyber security in social media

Shipping & Logistics

The Chairman of the ICT Consumers Association of Kenya Mr ALEX GAKURU spoke to NJOKI CHEGE about online safety in the social media

Question: What kind of information should one reveal online?

Answer: There are certain type of information that one must provide that are required by social media such as facebook and twitter to open a user account. This information such as name, date of birth and personal password must be supplied for identity purposes. Even when registering a domain name, the registrant is required to provide certain personal information, including their phone numbers, which then gets published. However, there are registrant privacy proxy services that exist for users who do not wish to have their details publicly published.

Q: What kind of information should one not reveal online and why?

A: Avoid unnecessary revealing of personal status such as marital status. Posting family and children details, names and where they go to school risks inviting kidnappers demanding ransom. You should avoid announcing one’s bank account, mobile money accounts passwords and obviously, PINS on social media or to any callers. Posting travel details, local or international, on social media may expose one to criminals.

Q: What security measures should one take to secure themselves and their information online?

A: Strive to read and understand how various platforms’ terms of user license agreements bind your use of their services. Do they own all information posted and/or what are your rights? Establish whether your platforms of choice offer "private spaces" for messages to your select few or if everything posted is visible to the whole world. Frequently search the web for your name to find out whether and where your details could be published by third parties.

Q: What are the common cyber crimes that people are vulnerable to as a result of revealing information about themselves online?

A: Most common include; Unsolicited emails also known as "SPAM" messages, anonymous and prank callers after callers extract phone numbers online and targeted online crimes such as attacks on individual’s website or blog. There are also political message hackers (or "hacktivists") attacks on website intended to plant propaganda or track politicians online communications to craft hard hitting politically hurtful messages.

Q: What should someone do in case they sense fraudsters online?

A: Restating general online rule, "be liberal with what you receive and conservative with what you send". It is best to ignore suspected fraudsters. Ignore them and when they sense that you don’t want anything to do with them, they will eventually stop bothering you.

Q: Is there an authority an individual can report to in case they fall victim to cyber crime and how do they deal with such cases?

A: The Kenya Computer Incident Response Team (KE-CERT) is on standby to advice on online security. Mobile operators have Law Enforcement departments collaborating with the police and CCK to ensure on cyber safety as espoused by the law.

In short, the police should assist. Users may contact Social Media platforms operators to request certain online information deleted. The Kenya Information and Communications Act, provides for certain electronic crimes. The proposed e-Transactions Bill, 2007 more comprehensively deals with cyber and e-crimes and once enacted, it shall guide further on the legal framework.

Q: How do you ensure that your children are safe while on social media?

A: Monitor your child’s online activities especially social media interactions. Avoid giving them broadband Internet devices. Also encourage them to discuss any strange online encounters, messages, chats or solicitations and make time to fully investigate such instances with appropriate parties and authorities.

Q: What should an individual do in case somebody hacks into their social media account?

A: Immediately contact your support services to inform them and seek their help. Use alternative social media or email account to alert your friends and contacts. Failure to act as such results in severe consequences, such as identity theft or impersonation. Hacked email accounts continue being used to pelt spam and woe contacts therein to web links intended to similarly hijack the already hacked account email contacts.

Business
Premium Burdened Kenyans walk into Easter weekend broke
Business
Premium Looming crisis as top lenders stare at Sh500b in bad loans
Business
Premium Water PS Korir put on the spot over Sh14m dam land
Business
Premium Ruto's food security hopes facing storm amid fake fertiliser scam