Argentina Crowns Champion of WORLD CUP 2022 in Qatar!!!FATIMA ZAHRA MOSQUE LAUNCHED!!! TURKIYE DIYANETS DONATES MODERN BOREHOLE WATER WELL TO BAMOI COMMUNITY!!!PRESIDENT BIDEN MEETS WITH PRESIDENTS OF SIX AFRICAN NATIONS TO PROMOTE FREE, FAIR, AND TRANSPARENT ELECTIONS!!!Senegal AFCOM Champions 2021!!!Guinea coup: Soldiers claim to seize power from Alpha Cond�!!! Afghanistan: Last US military flight departs ending America's longest war!!


CYBER SECURITY - SOCIAL ENGINEERING

By:Alhaji Mohamed Wusha-Conteh 16th August, 2024 08:00

Dear Editor

Please permit me space to dilate on the on topic cybersecurity, specifically in relation to social engineering methods. In my opinion, social engineering poses a serious threat in Sierra Leone by taking advantage of people's and institutions' weaknesses through dishonest means. By manipulating human behavior, social engineering obtains unauthorized access to data or resources, in contrast to traditional hacking, which frequently entails technological breaches. When it comes to protecting personal and corporate security, it is imperative to recognize and counteract the growing threat of phony hackers.

While social engineering used deception to obtain data, early cyberattacks used harmful code to bring down networks. Due to the ease with which we can use our phones to make payments on various electronic platforms, like Orange, Africell, and Q Money, some of which are connected to our bank transactions, there has been a rise in fraud, financial scams, and data breaches as a result of these tactics. Hacking organizations are a serious threat to people, companies, and even entire nations these days.

Social engineering attacks deceive people into giving money to criminals, downloading software, visiting websites, revealing information they shouldn't share, and making other blunders that jeopardize their personal or company security. Similar to many other places of the world, social engineering often refers to the deception of people into disclosing private or sensitive information that could be exploited fraudulently. This can involve deceitful strategies like baiting, phishing, pretexting, and other similar ones.

It is a good idea to define social engineering before diving into the subject. Although there are many definitions of social engineering, I will limit my discussion to the idea that it is a tactic used by malevolent actors to trick people into disclosing private information or taking actions that jeopardize security. Rather than depending on technological flaws, these strategies take advantage of psychological influence. Phishing, pretexting, baiting, and tailgating are examples of common techniques.

1. Phishing: Phishing is the practice of sending phony messages that look to be from a reliable source, frequently via email, messages on facebook and WhatsApp. The intention is to deceive people into revealing private information, including passwords or bank account information, sending money or reporting someone travelling stranded etc. Phishing attacks are becoming more common in Sierra Leone, targeting both people and companies and taking advantage of people's trust and sense of urgency to accomplish their goals. You will almost always come across a sponsored Facebook page proclaiming something like a free online certificate from the Ministry of Education, fully funded study abroad programs, free gift money online, and so on. This is just to get your information when you click on the link.

2. Pretexting: This tactic is fabricating a situation in order to get information. To obtain account information, for instance, a hacker can impersonate a bank agent. The victim's readiness to agree with requests that appear reasonable is the focus of this tactic.

3. Baiting: This tactic entails luring victims into a trap by making an alluring offer. Attackers may, for example, give away free hardware or software that, when utilized, infects the victim's computer with malware.

4. Tailgating: This strategy includes entering restricted locations physically by trailing authorized persons. Social engineers could use this technique to get entry to safe areas or networks.

The impact of social engineering attacks in Sierra Leone has been noteworthy. While organizations and enterprises experienced operational disruptions and data breaches, individuals have experienced monetary losses. This nation is especially susceptible to these fraudulent activities due to its increasing reliance on digital channels.

 Awareness and Education: Education is the primary line of defense against social engineering. People and institutions ought to receive training on how to spot suspicious activity and take appropriate action. Identifying typical strategies and warning signs can help stop a lot of attacks.

 Verification Procedures: Make sure that the person requesting sensitive information is who they say they are. Instead of replying to unwanted messages, get in touch with the organization directly through proper methods.

 Strong Authentication: To provide an additional degree of protection, use multi-factor authentication. Extra verification procedures can shield accounts from unwanted access even in cases where login credentials are compromised.

 Continuous Patches and Updates: Make sure that all systems and software receive frequent updates to address vulnerabilities. Technical security measures continue to be a crucial component of overall security, even if social engineering frequently targets human behavior.

 Incident Response strategy: Create and keep an incident response strategy to deal with possible security lapses. It is possible to lessen the effects of an attack and stop additional harm by acting quickly and effectively.

 Proactive News Releases: To prevent individuals from falling for social engineering schemes and disclosing personal information, particularly to institutions of higher learning that they often use advertising free online courses and telecom networks as if they offer free data.

Understanding and caution are essential since social engineering remains a serious challenge in Sierra Leone. Individuals and organizations can strengthen their defenses against these deceptive strategies by educating themselves and others, putting robust security procedures into place, and keeping up with new developments in the field. Proactive steps are crucial to protecting personal and professional data in a digital age where trust is easily betrayed.

Sierra Leone can better manage the difficulties presented by social engineering and work toward a more secure digital future by cultivating a culture of security knowledge and resilience.