The number one concern among technology users in South Africa is the impact of technology on their privacy.
This was the finding of the annual poll on How Personal Technology Is Changing Our Lives, which surveyed 12 000 Internet users, in 12 countries over 12 months.
According to ASUS South Africa, the enthusiasm of developing nations for new technology has yet to be met by an equally strong security culture amongst end-users. This is especially so in South Africa where an estimated 24,9-million South Africans access the Internet, which is about 50% of the total population.
“Much hype surrounded well-known data breaches such as the catastrophic iCloud and Sony hacks of 2014, but, few understand that technology and its innovation has created new opportunities for criminals targeting ‘the everyday man’ – whether it is browser cookies used to track user behaviour, social media websites and apps that collect and distribute personal data, or cloud storage services that are vulnerable to hacking, leading to personal photographs and information being shared unwillingly on the Internet,” says Peter Chang, product manager at ASUS South Africa.
Chang believes that technology providers and governments cannot be expected to be solely responsible for ensuring consumer security. Efforts have been made by leading tech innovators to enhance mobile phone security.
Smartphone apps, such as MyPermissions and CM Security’s AppLock Selfie are some of the tools that have been positioned as protectors of personal information. ASUS’s cloud service, WebStorage, uses One Time Password (OTP) Authentication that is generated every 30 seconds and can only be used once; in addition, the WebStorage servers are protected by detection systems and a variety of encryption.
“From a government perspective, South Africa’s Protection of Personal Information(POPI) Bill was passed more than two years ago, yet consumers are still being subjected to relentless SMS/email spamming and telemarketing calls. Phishing awareness is lacking, and credit card verification certificates are not common among online retailers, which results in a general lack of trust of online shopping portals.
“However, the bottom line is that technology is as vulnerable as the consumer allows it to be. This is where a security culture is needed especially as cybercrime now costs the South African economy R5,8-billion a year. It is not a challenge for government and corporates, it’s a challenge for all people of developing countries that are becoming accustomed to the wonders of technology.
“What we know for sure: By 2018, all mobile phones sold will be smartphones, and the wireless network coverage will expand to every corner of the world, opening the door for more people from emerging economies to access the web via mobile Internet and share ideas, collaborate, and influence the geopolitical landscapes.
“Smartphones, wearables, robotics, sensors, drones, Internet-connected home appliances and self-driving vehicles are all technologies that will see the improvement of living standards and business productivity although with it comes greater risk and criminal opportunity. In preparation for the new-era of technology, Africans need to be educated on what tech security actually means and what it demands of them in order for their privacy to remain safe. We cannot and should not wait for the law to ‘catch-up’ to our needs, but rather equip ourselves with the skills to manage our own information as best we can.
“On a national level and into the future, government should focus on aligning the POPI Act with newer technologies that are available on the market, to regulate how information is collected and used. Government incentive programmes need to be launched, rewarding businesses for utilising tighter data control and opt-in measures and penalising those that do not comply.
‘Anti-phishing technology needs to be made available to all bank clients, free of charge and easy to install on any browser or device. Security add-ons should be embedded on all Internet ready mobile devices and the law must ensure cloud services, applications and systems comply with the encryption and security management requirements,” Chang adds.