• Latest
  • All
  • How To
hacked

How You Can Best Protect Yourself Amidst a Surge in Global Cyberattacks

September 4, 2023
iOS 19

iOS 19 Will Sync Public Wi-Fi Access Across All Your Apple Devices

May 12, 2025
Linking PayPal to M-pesa

How to Withdraw Money from PayPal to M-PESA in Kenya

May 12, 2025
spotify-mobile

Spotify Introduces ‘Snooze’ Button to Temporarily Mute Overplayed Tracks

May 12, 2025
Google messages

Google Messages Rolls Out New Features Including Delete for Everyone

May 12, 2025
DHgate Tablet Cases deals
samsung galaxy 25 edge

Samsung Galaxy S25 Edge Is Launching on May 13

May 12, 2025
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 12, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 12, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

How You Can Best Protect Yourself Amidst a Surge in Global Cyberattacks

ElvyLewis Ndungu by ElvyLewis Ndungu
September 4, 2023
in News
Reading Time: 3 mins read
257
0
hacked

A mid-year security report by Check Point Research (CPR) has revealed an 8% surge in the number of global weekly cyberattacks in Q2 2023, the most significant rise in two years. The report attributes the increase to attackers cunningly combining next-gen AI technologies with long-established tools like USB devices to conduct disruptive cyberattacks. The report further notes that ransomware attacks have escalated in the first half of the year with new ransomware groups coming into the scene.

The 2023 Mid-Year Security Report by Check Point Research uncovers the trends and behaviors that have defined the year so far including the rise of Anonymous Sudan which recently targeted Kenyan infrastructure.

Key insights from the report include a rise in hacktivism and ransomware groups who have stepped up their game, resurfacing of USB drives as significant threats and lastly exploitation of Artificial Intelligence to carry out cyber attacks. Particularly, generative AI tools are being used to craft phishing emails, keystroke monitoring malware, and basic ransomware code.

According to the report, H1 2023 has seen 48 ransomware groups have breached 2,200 victims. This represents a 20% increase as compared to the same period in 2022.  The manufacturing and retail sectors have seen the most victims, suggesting a shift in ransomware attack strategy.

“Criminal activities have continued to rise in the first half of the year, with an 8% surge in global weekly cyberattacks in the second quarter marking the highest volume in two years. Familiar threats such as ransomware and hacktivism have evolved further, with threat groups modifying their methods and tools to infect and affect organizations worldwide. Even legacy technology such as USB storage devices, which have long been gathering dust in desk drawers, have gained popularity as a malware messenger.” said Maya Horowitz, VP Research at Check Point Software.

Preventive measures against cyber attacks

Notably, as global cyber attacks continue to rise, Kenya is no exception with the country being the third most targeted nation in the continent. There is a need to take preventive measures to protect yourself and your business from cyber threats as attacks increase in frequency and complexity.

“Organizations need to build a cyber resiliency strategy and strengthen their defenses by adopting a prevention-first, integrated approach to cyber security. Cyberattacks are inevitable but can be largely prevented by proactive measures and the right security technologies.” Maya Horowitz added.

Here are some measures you can take to prevent cyber attacks:

  • Taking updated cybersecurity awareness training that will educate you and your employees on the best security practices.
  • Conducting regular security assessments and audits to help identify potential vulnerabilities. This is to ensure that appropriate security controls are in place and working appropriately.
  • Implementing strong password management policies as well as encrypting your data and performing regular backups.
  • Use of trusted and reputable anti-malware applications or tools.
  • Regularly updating your systems with the latest security patch to eliminate known vulnerabilities.
  • Conducting regular network traffic scans and monitoring to identify potential threats.

In addition to the measures above, it is important to invest in the right cyber talent to boost the security of computer systems and data.

Tags: Cybersecurity
SendShare147Tweet92
ElvyLewis Ndungu

ElvyLewis Ndungu

Just a guy who loves to code and has a passion for storytelling | Bringing you the latest on all things tech. You can reach me via [email protected] or on Twitter.

Related Posts

apple trump

Apple Warns iPhone Users in 100 Countries of Targeted Spyware Attacks

May 6, 2025
KICTANet Cybersecurity Memo

KICTANet Pushes for Changes to Kenya’s Draft Cybersecurity Strategy

April 26, 2025
Web DDOS Tsunami Attack

Web DDoS Tsunamis Are the Next Big Cyber Threat to Organizations

April 25, 2025
MTN Reports Data Breach Affecting Some Customers

MTN Hacked: Customer Data Exposed in Certain Regions

April 25, 2025
phishing emails

Hackers Now Sending Phishing Emails From “[email protected]”

April 22, 2025
Hospitals Targeted by Stealthy New Malware Called ResolverRAT

Hospitals Targeted by Stealthy New Malware Called ResolverRAT

April 15, 2025

Latest

iOS 19

iOS 19 Will Sync Public Wi-Fi Access Across All Your Apple Devices

May 12, 2025
Linking PayPal to M-pesa

How to Withdraw Money from PayPal to M-PESA in Kenya

May 12, 2025
spotify-mobile

Spotify Introduces ‘Snooze’ Button to Temporarily Mute Overplayed Tracks

May 12, 2025
Google messages

Google Messages Rolls Out New Features Including Delete for Everyone

May 12, 2025
samsung galaxy 25 edge

Samsung Galaxy S25 Edge Is Launching on May 13

May 12, 2025
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 12, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

iOS 19 Will Sync Public Wi-Fi Access Across All Your Apple Devices

May 12, 2025

How to Withdraw Money from PayPal to M-PESA in Kenya

May 12, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

How to Handle Private Number Calls in Kenya

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

Starlink Is Expanding in Africa Through New Airtel Partnership

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.