Our Blog

Imagine a wall that is 1000 feet high, made of concrete and re – enforced with strong metal bars. There is an electric fence that hugs the wall tightly and goes all the way up. There are also hundreds of healthy German Shepherds which are highly trained and roam the wall at all times. In addition, there are dozens of snipers strategically located across the wall, with shoot – to – kill orders in the event of any intruder. And still, someone managed to sneak past the wall, unnoticed, and stole valuables worth millions of dollars. That is just how the KRA Systems were hacked. If KRA systems could get hacked, why not you? There are people who sit behind computers all day, working as hard as you do, in order to rob you off. Hacking can take a split of a second, in the click of a mouse, or a tap of the Enter button. Here are a few tips to avoid being hacked:

  1. Wi – Fi. Do not connect to any Wi – Fi network you are not aware of, or do not know of its authenticity. Once connected over Wi – Fi, you expose your device to every other device connected on the network. They can access your data, information and can monitor anything you are doing from their end.
  2. Webcam. Always ensure the webcam of your PC is covered. Hackers can take advantage of your privacy and record videos or take images of you while at the comfort of your own home, then use them to blackmail you. A piece of masking tape could do the trick, which of course you can remove once you need to use your web camera.
  3. Always log out your accounts from other people’s devices. Sometimes we need to check our emails, or update our Instagram posts but find out your battery is dead. You borrow a friend’s phone, or pop into a cyber, and get online. Once you are done, you just return the phone or leave the cyber without logging out. There. You just exposed yourself. Ladies and gentlemen, make use of the ‘Log -out’ button.
  4. Click – ads. We have all experienced these irritating icons that keep popping up and covering your screen while you are in the middle of reading that juicy story on your favourite blog. Clicking on the icon redirects you to a new page which asks you for your details. They often have these mouth – watering deals that you just cannot resist. Well, this is where the proverbial deal is too good. Think twice. Do not click on any icons or ads that you did not request.
  5. Verify websites. Hackers have invested into their industry so heavily that they have gone to the extent of creating phishing websites which they can use to retrieve victim’s details, passwords, ID numbers, cell phone numbers, photos, account numbers and PINS. Well, whenever you are about to fill in your details to such a website, always open up a new tab and type the web address of that specific website. The results will let you know whether you need to trust the website or not. Sometimes the difference is usually so negligible you may fail to notice them. For example: Safaricom’s official website is www.safaricom.co.ke. However, hackers can create a phishing website and name it www.safaricom.net then use it to access details of your M – PESA or M – Shwari account. When the stakes are that high, the only person you can trust is yourself. Do not be a victim. Be a victor.

Comments ( 0 )

    Leave A Comment

    Your email address will not be published. Required fields are marked *