AFRICA is now a prime target for cyber attackers, with Zimbabwe among the vulnerable countries, says Liquid Intelligent Technologies.
Loretta Songola, regional chief commercial officer for Central Africa, noted that small and medium enterprises (SMEs) are vulnerable to cybercrime due to perceived security weaknesses.
“For Zimbabwe’s SMEs, partnering with a cyber security provider like Liquid Intelligent Technologies is key,” she said.
“With its vast experience in safeguarding SMEs’ assets, Liquid’s cloud and cyber security solutions offer SMEs peace of mind and a 360-degree view of the entire business environment.”
There are over 60 000 registered SMEs in Zimbabwe, which contribute up to 60 per cent to the country's gross domestic product.
She said Zimbabwe’s SMEs need a cyber security risk management strategy driven from the top and managed by a dedicated official who can identify and act on problems immediately.
Keep Reading
- Open letter to President Mnangagwa
- Feature: ‘It’s worse right now than under Mugabe’: Sikhala pays the price of opposition in solitary cell
- Masvingo turns down fire tender deal
- Human-wildlife conflict drive African wild dogs to extinction
SMEs should keep an inventory of hardware, software and sensitive data and identify potential vulnerabilities.
Role-based access control to these records and assets is a good idea, she noted.
“Weak or stolen passwords are a common entry point for cybercriminals. Employees must use complex passwords that combine letters, numbers and special characters,” Songola said.
“Multi-factor authentication and regularly updating systems provide an added layer of protection. Breaches are often due to human error or a lack of awareness.
“Training employees to identify phishing emails, create strong passwords and reporting suspicious activities helps safeguard against these risks and builds a culture of security awareness.
“Unsecured Wi-Fi networks are an open invitation to cybercriminals. Strong encryption that ensures only authorised devices can access the network, and a separate network for guests are some solutions to this challenge.”
She said firewalls and antivirus tools should be kept updated to protect against the latest threats.
Proactively monitoring network traffic helps detect suspicious activities early, while intrusion detection and prevention systems guard against real-time threats.
Having a response plan can minimise damage in a cyberattack.
It should outline the steps to take during a breach, who to notify, and what actions to take, ensuring everyone understands their role, she highlighted.
Songola said regular back-ups and a clear recovery plan ensure that a business can get back on its feet quickly after a cyber incident.
Back up critical business data to a secure off-site location, she urged.
“Our holistic approach to cyber security empowers Zimbabwe’s SMEs with tailored solutions that pre-emptively protect against attacks before they affect the business.”