Kenya recently experienced a series of hacking incidents that rendered more than 5,000 digital government services inaccessible. To prevent similar occurrences in the future, experts believe that the increased deployment of artificial intelligence (AI) could be the key. However, they also warn that AI has its downsides, such as impersonation and falsification of identities, which cyber adversaries could exploit to orchestrate sophisticated cyber-attacks.
Peter French, the general manager for the Middle East and Africa at Acronis, a Swiss technology company, suggests that companies should embrace AI-powered cyber protection to safeguard their valuable digital assets. French acknowledges that integrating AI into Africa’s digital ecosystems presents new opportunities and challenges.
Based on the Acronis End-of-Year Cyber Threats Report 2022, financial phishing attempts in Kenya and Nigeria saw a significant increase in the first and second quarters of 2022. Banks, online payment systems, and e-commerce websites were indiscriminately targeted. The number of financial phishing attacks detected in Kenya in Q2 of 2022 increased by 201% compared to Q1, reaching over 100,000 attacks. In Nigeria, there was a 79% increase, with over 61,000 attacks reported.
These statistics do not include recent incidents like the hacking of Kenya’s e-Citizen platform. However, they highlight the ongoing trend of cyber threats in emerging economies. Businesses and organizations in these regions have reported various cyber incidents, including online scams, digital extortion, business email compromise, ransomware, botnets, espionage, threats to critical infrastructure, and organized crime.
While AI can be a powerful tool for cyber protection, InterPol’s African Cyberthreat Assessment Report emphasizes the importance of maintaining a balance between cost-effective day-to-day operations and reducing the risk of falling victim to cybercriminals.
In conclusion, the deployment of AI in Kenya’s digital ecosystems holds promise for strengthening cyber security. However, careful consideration of the potential risks and a comprehensive approach to cyber protection are necessary to mitigate the ever-evolving threat landscape.
