Will your anti-fraud strategy prevent hacking?
Tom Muleya Fraud Insight
Cyber hacking has emerged to be one of the global problematic crimes in the 21st century to both the corporate world and individuals.
How the private sector, public sector, and individuals will be able to deal with this monster remains a big question! With the internet becoming central part of daily life, hacking is also becoming more sophisticated than ever before as new cyber threats are emerging on a regular basis.
Due to ever advancing technology and sophistication of computer crimes, Government had to craft the Data Protection Act to amend Sections (163-167) of the Criminal Law Codification and Reform Act.
Previously it was impossible for the law to adequately provide all essential elements needful to prosecute for a cybercrime case such as hacking. In the new Data Protection Act, hacking is one of the cybercrimes enshrined in the Act.
Computer hacking will give many organisations headache during this year 2023 and beyond. At the start of this year, CID Commercial Crimes Division received reports of cyber hacking of corporate organisations involving many millions of Zimbabwean dollars, thanks to the ZRP’s vigilant officers, detectives were quick to arrest some syndicates in these cases. The culprits have since appeared before the criminal courts.
In the previous article, we looked at the issue of implementing a sound and effective anti-fraud strategy to reduce cyber related crimes at organisations regardless of industry and size. Any organisation that will put in place and implement an effective anti-fraud strategy will be able to detect cyber incidences at an earliest possible time and will be able to quickly respond to crimes such as hacking.
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
It is an act of identifying and then exploiting weaknesses or vulnerabilities in a computer system or network, usually with intent access to personal or organisational data such as financial information.
Cyber hackers employ a variety of techniques to hack their victims that include among others ‘social engineering’, password hacking (brute force attack), infecting devices with malware, exploiting insecure wireless networks, logging keystrokes, phishing emails, gaining backdoor access and creating zombie computers.
Whatever technique cyber hackers use, once they gain access to your data or devices, they can:
- Successfully steal your money and open credit card and bank accounts in your name.
- Make purchases on your behalf.
- Use or abuse your social security number.
- Delete or damage important files on your computer.
- Obtain sensitive personal information and share it or threaten to share it publicly.
- Request new account Personal Identification Numbers (PINs) or additional credit cards.
- Add themselves or an alias that they control as an authorised user so it becomes easier to use your account.
- Obtain cash advances, among others.
Participate in the fight against fraud and cybercrimes. Think anti-fraud, think anti-cybercrime.
Tom Muleya is a Detective Assistant Inspector working under the CID Commercial Crimes Division. He is also a member of the National Cyber Security Awareness Taskforce, Zimbabwe.
Feedback: WhatsApp: 0772 764 043, or e-mail:[email protected]