07 May 2021

Privacy and Identity Theft

Privacy and identity theft

When an unauthorized person uses your personal identifying information, such as your name, address, or credit card or bank account information to assume your identity in order to commit fraud or other criminal acts, that’s identity theft.

Different Forms of Identity Theft

Skimming

This occurs when someone uses your card without your permission. Even if a criminal doesn’t have your physical card in hand, they can still make unauthorized transactions with your credit card number, PIN and security code. Someone could even use your card information to try to gain access to your other accounts.

Online Shopping Fraud

Some criminals use your saved card information to make unapproved purchases, as they have mastered the art of hacking their way into website accounts. A common situation occurs when shoppers use their accounts while connected to an unfamiliar Wi-Fi network, such as one at public places. Hackers can set up the exact legitimate networks with the intention of stealing the information of anyone who connects. Hence it’s always smart to shop, do your banking and handle any other sensitive information on a private Wi-Fi network you trust.

Phone scams

You may get a call from these fraudster claiming to be working from a certain bank or credit firms. They call asking for crucial information, such as your pin. If you receive this kind of call, don’t provide any information over the phone.

Malware

This is a number of malicious software variants, including viruses, ransomware and spyware. Malware could allow the criminal to access the device and information stored on it. Criminals use different techniques to install malware on another person’s device.

Child Identity Theft


This occurs when a child’s identity is compromised by fraudsters. Unfortunately, a good amount of child identity theft occurs within families. They can use Social Security numbers, birthdays, addresses and more to open fraudulent accounts. They may also apply for government benefits, take out loans or find other ways to rack up debt in the child’s name.

Signs of identity theft to look out for.

  1. When you get calls from credit and debt collectors about charges you didn’t make.
  2. Your financial statements have discrepancies, or your bank statement shows purchases or withdrawals you are not aware of.
  3. When you don’t get bills in the mail. Meaning someone has stolen your data and changed your billing address
  4. Getting unfamiliar charges on your credit card statement.
  5. You receive medical bills for services you didn’t receive.

Need to get in touch? Get us on https://kemnet.co.ke/contact/

Share this
24 Mar 2021

PHISHING ATTACK

PHISHING

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or install malware on the victim’s machine.

Three Stages Of a Phishing Attack

Step 1: The Information (Bait)

The first of the three steps of a phishing attack is preparing the bait. This involves finding out details about the target. It can be as simple as knowing that they use a particular service or work at a particular business. If a service leaks a list of just email addresses of its users, criminals will be able to know all the owners of those email addresses. They will use that service and can target them with emails that pretend to be from that service.

In more sophisticated spear phishing attacks, cyber criminals can harvest details from your social media profiles in order to build a highly customized spear phishing message that is highly likely to convince you of its genuineness.

How to identify phishing attacks.

Glance at how your emails can be hacked.

Step 2: The Promise (Hook)

Once the attacker has acquired the necessary information to use as bait, they then need to lay out the hook. To actually make the target perform an action, the attacker needs to promise something or scare them into action.

In many scams the hook involves making the target believe that one of their accounts have been compromised. This creates a sense of urgency and making the target act quickly, perhaps without thinking. The attacker can then redirect the target to follow a link to a page where they can harvest the victim’s details.

Step 3: The Attack (Catch)

The third phase of phishing is the actual attack. The cyber criminal sends out the email, and prepares for the prey to fall for the bait.

What the attacker’s next action will be will depend on the nature of the scam. For example, if they used a landing page to gain the victim’s email password, they can then log in to the victim’s email account in order to harvest more information and start sending further phishing emails to the victim’s contacts.

Ways to Prevent Phishing Attacks

Don’t give your information to an unsecured site

If the URL of the website doesn’t start with “https” do not enter any sensitive information or download files.

Know what a phishing scam looks like

There are many sites online that will keep you informed of the latest phishing attacks and their key identifiers. The earlier you find out about the latest attack methods and share them with your users through regular security awareness training, the more likely you are to avoid a potential attack.

Install firewalls

Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker.

Don’t give out important information unless you must

As a general rule of thumb, unless you 100% trust the site you are on, you should not willingly give out your card information.

Need domains and hosting, Internet connection, Web solutions? Feel free to contact us anytime. Give us a call or drop us an email.

 

Share this
11 Feb 2021

INTERNET SPEED DETERMINANTS

Internet speed determinants.

Broadband speed refers to how quickly data can be uploaded or downloaded. When comparing broadband deals, pay attention to how many Kbps or Mbps you get and at what cost.

Broadband speed is measured in Mbps (megabits per second) and Kbps (kilobits per second). A bit is the smallest unit of data that can be transferred so when it comes to calculating speed the higher the number of bits per second, the faster your broadband connection will be.

Kbps and Mbps measures are:

  • 1 Kbps: 1,000 bits per second
  • 1 Mbps: 1,000,000 bits per second

Speed is one of the main things you will need to consider, when choosing a broadband package. However, many consumers don’t know what broadband speed is or how many Mbps they’ll need when setting up broadband for their home or office.

Determinants.

To determine how much broadband speed, you need, you may also want to consider the usage requirement of everyone in your household or office. This is because the number of people using the connection can affect the overall broadband speed.

Ways to determine your current Broadband speed;

  • When choosing a bandwidth, you should consider the monthly bill as it should reflect the minimum speed you are getting.
  • Do a speed test online for the bandwidth you have chosen. These tests work by sending data to and from a main server. They then time how quickly the data completes the round-trip. The result gives you the exact current speed of your internet connection.

It’s good practice to regularly test the speed of your broadband connection. This way, you can always make sure that you are getting what you pay for.

Speed test on broadband.

 

 

A good broadband speed will depend on your personal preference and how you use the internet. We have 3 categories of users.

  • Light users: If you need a broadband connection to check your emails, do your online banking, and browse just a little, then you are a light user and your broadband speed can be kept minimal.
  • Medium users:If you use the internet frequently for social media, browsing the net, and catching up on the latest episode of your favorite series over and above the internet basics, then you’re considered a medium user. Medium users will need a slightly faster connection than light users.
  • Heavy users:If you use the internet for a significant amount of time, then you can be considered a heavy user. Heavy users are those who do peer-to-peer file sharing, online gaming or stream films and music.Speed is one of the main things you will need to consider, when choosing a broadband package. However, many consumers don’t know what broadband speed is or how many Mbps they’ll need when setting up broadband for their home or office. You can click here to see our internet packages that will suite your usage.
Share this

© Kemnet Technologies. All rights reserved.

Click Me