• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

How African States Can Tackle State-Backed Cyber Threats

Idara Umoren by Idara Umoren
August 13, 2021
in Security
Share on FacebookShare on Twitter

 

Owing to the low penetration of broadband and digital resources on the African continent, there are concerns over what the state of the nation would be if cyber threats became a really big issue. Cyber-attack by state-backed hackers would seem possible because Africa is yet to mature to a stage with equipped cyber-defence measures. Already, there have been reports of targeted high-profile state-sponsored attacks. Take the Chinese Espionage at the  African Union  as one instance, and North Korea’s Wannacry Ransomeware attack in 2017.

Not to totally erase Africa as a continent that is yet to “see the light” in technology, there is need to establish the fact that some African countries are fully equipped, and are competing with cyber world powers. On the converse side, low digitization levels has a way of shielding Africa’s exposure to these threats, compared to other parts of the world that are neck-deep in cybernetics. So, while the low digitization status of Africa may be seen as a developmental deficit, in the cyber world, it is a positive status because Africa would be a less than preferred choice for cyber wars.

States that are still developing technology-wise, can choose to “build” on their limited structure by considering the steps of developed nations who first took on certain cyber solutions, and how the technical test of such solutions worked out for them.

Building on Foreign Engagement

Many African states ae on the vulnerable side of cyber-attacks because of the monopoly they have handed to the entity in charge of building their tech stacks .

Consider South Africa:  Eskom is responsible for supplying electricity to a major part of the Sovereign state. Assuming that Eskom comes under a cyber-attack; its functionality would not only be compromised but also the public health and safety of the region under its oversight would be shaky, not forgetting the economic implications.       

Another example of the harm in monopoly is in internet broadband connection. 70% of 4G base stations are made and controlled by Huawei – a Chinese commercial tech force. As 5G is about to dominate the market, Huawei is set to strike, grow and gain roots. The problem here is that huge power is given to one entity that could take it into their hands, to decide the fate of the functionalities it remits.

African countries can solve this problem by having a pool of foreign tech suppliers that they can rely on. Supporting local tech innovation too would be a big plus. These measures would not only reduce their reliance on just one system or entity, but will also give them power to meet diverse partners, establish patterns that make threat detection and monitoring easy, and response capabilities solid.

For some African countries, they have employed the “Partner diversification system ” in building their tech stacks. An example is what Ethiopia adopted: Most of its telecommunication products were constructed by Chinese firms. However just recently, they awarded a major telecommunications license to a US-backed consortium led by Safaricom that is Kenya-based. As reflected by trends, it is important that African countries invest in African technology partners.

Building on Local Collaborations

Unique to Africa, is its well-developed regional security architecture and strong representation in global communities, like the United Nations. African countries can further solidify this by developing and adopting Common African Positions as regards some aspects of state-sponsored cyber threat.

All African countries share something as regards military cyber operations, monitoring, sharing information and dissuading cyberattacks from critical infrastructure. In the same vein, African nations need to increase the participation of thought leaders to tackle issues like data sovereignty and accountability.

In Conclusion…

The continent is vulnerable, but not entirely helpless. Adopting measures like having diverse tech suppliers, building strong bonds via global institutions and coming together to prioritize counter cyber-attack defences, will put the nation in a good place, hidden from cyber-attack.

Related Posts:

  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • FILE PHOTO: A computer keyboard lit by a displayed cyber code is seen in this illustration picture
    Hackers Sabotaged Several Senegalese Government…
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • EXKKFK7XDBJ63KQSUZF7C7NJB4
    The Kenyan Government Data Breach Is Impacted By…
  • android_kotlin
    Analysing the Decline In Fintech Funding In Africa…
  • IMAGE-1-1200×630
    South Korea Assent To Support Kenya Debut A Smart…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cyber attackcybersecuritygovernment
Idara Umoren

Idara Umoren

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • YouTube Premium Targets Account Sharing, Netflix-Style September 2, 2025
  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.