Building an Effective Business Strategy

Select Country
Select Country
Have you ever been scammed? If not, you have probably received a phone call or message carefully crafted by fraudsters with either an emotional appeal, suspicious links to click on, or claims of wrongly sent mobile money which wasn’t sent. Isn’t it interesting how cybercriminals get into your head and lead you to dark lanes of information or financial theft? Don’t be a victim. You can protect yourself and your business from malicious attacks by staying alert.
That said, what is Cyber Security? It is the protection of internet-connected computers and/or mobile devices from unauthorized access, abuse, fraud, or crime; components collectively known as cyber-attacks or cybercrime. Here are some of the common types of cybercrime:
The harsh reality is that anyone, whether an individual or a corporate, can be a victim of cybercrime. Apart from financial losses, cybercrime can result in serious reputational damage, especially for corporates, whose effects are carried on for years.
A currently common mode of cybercrime is the sim swap fraud where cyber criminals hijack a victim’s cell phone number and use it to gain access to sensitive personal data and bank accounts through Mobile Banking Apps. Once they take control of the swapped SIM card, the crooks access the financial accounts of the victim, having socially engineered credentials or information that could facilitate account resets, and transfer all the funds to other scammed telephone numbers.
With the high rate of adoption of technology and digitization, especially during the current COVID-19 crisis, cybersecurity is a hot topic to arrest. Fraud activities are on the rise now, more than ever and businesses have to rethink their measures. An Africa Cybersecurity Report 2019/2020 by Serianu – a Pan-Africa-based cybersecurity and Business Consulting firm, shows that malware attacks are expected to rise, and in particular, locally developed or re-engineered strains.
The same report also reveals that Kenya's economy lost more than Kshs. 29.5 billion from cyber-attacks in 2018. According to an article by the Business Daily in February 2021, The Communications Authority of Kenya (CA) data showed that more than 56 million cyber threats were detected nationwide in comparison to 37.1 million in 2019. The CA further expounded that a majority of the threats were malware attacks at 46 million, followed by web application attacks at 7.8 million while 2.2 million Distributed Denial of Service (DDoS) threats were detected during the same period.
Evidently, there’s a need to develop diplomatic strategies to curb financial losses and information system vulnerabilities, thereby improving/earning customer trust. This said the top priority for a business is safeguarding its assets and client information from unauthorized access.
So why is cybersecurity bound to make an impact on your business?
In this fourth industrial revolution, you must remain mindful of your cybersecurity and that of your business. We are on your side!
Hey, hope your well. From my end all has been well… Last week as I was making a purchase online, It occurred to me how e-commerce sites make purchasing products so easy and convenient yet they can also be a gateway to fraud.
Come to think of it, there has been a lot of public awareness and sensitization on how to protect oneself from cybercriminals. However, the question is, when it comes to online shopping, what can ecommerce merchants do to protect their customers from fraudsters? In as much as e-commerce sites have multiple security features on their sites, some of the red flags to watch out for include:
- Multiple declined transactions, especially in cases where the user keeps on entering the wrong card details or there are insufficient funds… It may be common for a customer to enter wrong card details once or twice but anything more than that should raise eyebrows.
- Multiple orders from multiple credit cards from the same user within a short period of time.
- Multiple shipping addresses. The buyer makes multiple purchases under the same billing address but ships products to multiple destinations. A merchant can seek authentication from such a shopper just to be sure that this is not a fraudulent activity.
- Large orders from a new country/ location: From your previous data you’ve never received site visits or purchases from a particular country then all of a sudden there is a string of orders from that country. Do a careful assessment before you allow the purchase process to continue.
- Multiple orders originating from multiple geographic locations and different IP addresses within a short period of time. E.g. a customer always makes a purchase from Nairobi from a specific IP address but you notice a purchase origination from Mombasa from a different IP address.
- Transaction value outside of a customer’s profile. For instance, customer who on average spends Ksh 50,000 on his purchase then all of a sudden makes a purchase order of ksh 700,000 should be considered suspicious.
- Inaccurate data: You may find the customer’s email address doesn’t match the IP address or the zip code doesn’t match the country.
- Multiple transaction over short period of time. A customer making back to back purchases in a day or two should be treated with suspicion. The merchant should contact the buyer just to ascertain that the purchases are indeed legit.
These are just but a few red flags indicative of fraud that a merchant should pay attention to. Remember that as you enhance your site’s security features, cybercrime is also evolving. Therefore, always be on the lookout for such suspicious activity and where necessary put in place mitigating controls. These may include withholding suspicious purchases and additional identity verification of customers via one-time passwords to the customer’s registered contact information.
As I conclude, fraudsters prey on loopholes to make their kill. #KaaChonjo and help protect your customers from cybercriminals.
Yours faithfully
IMBA