{"id":1104,"date":"2024-11-12T10:10:53","date_gmt":"2024-11-12T10:10:53","guid":{"rendered":"https:\/\/thepixelcurve.com\/edubin\/lp\/?p=1104"},"modified":"2024-11-12T17:30:30","modified_gmt":"2024-11-12T17:30:30","slug":"les-7-grandes-menaces-de-cybersecurite-en-afrique","status":"publish","type":"post","link":"https:\/\/ceditech.ci\/en\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/","title":{"rendered":"The 7 major cyber security threats in Africa"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1104\" class=\"elementor elementor-1104\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfc562f e-con-full e-flex e-con e-parent\" data-id=\"bfc562f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ed5e29d e-con-full e-flex e-con e-child\" data-id=\"ed5e29d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7e21e4 elementor-widget elementor-widget-text-editor\" data-id=\"a7e21e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to the 2024 Interpol Africa Cyber Threat Assessment Report from the Bureau for Cybercrime Operations in Africa, the following cybercrime threats are highlighted <strong>the main threats facing the continent<\/strong>. Let's take a look at these threats to better understand their impact and how to protect against them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07fafa9 elementor-widget elementor-widget-spacer\" data-id=\"07fafa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ec8937 e-flex e-con-boxed e-con e-parent\" data-id=\"9ec8937\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c06c5c6 e-con-full e-flex e-con e-child\" data-id=\"c06c5c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-823d1e4 elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"823d1e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"Closeup of programming code and language\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/closeup-programming-code-language-1024x576.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d2ba491 e-con-full e-flex e-con e-child\" data-id=\"d2ba491\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b69a1f elementor-widget elementor-widget-elementskit-accordion\" data-id=\"6b69a1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfe9c687\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-6b69a1f\">\n                        <a href=\"#collapse-81acaa169f37dfe9c687\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfe9c687\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfe9c687\">\n                            \n                            <span class=\"ekit-accordion-title\">1. Ransomware: an omnipresent threat<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfe9c687\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-6b69a1f\" data-parent=\"#accordion-69f37dfe9c687\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Ransomware attacks are among the most feared types of attack. They involve encrypting the data of a company or individual, making access impossible until a ransom is paid. In Africa, this type of attack is intensifying, particularly targeting businesses and government institutions.<\/p><p><strong>Why is this a problem?<\/strong> These attacks disrupt operations and expose sensitive information to the risk of disclosure.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f920a5 e-flex e-con-boxed e-con e-parent\" data-id=\"0f920a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07c103c e-con-full e-flex e-con e-child\" data-id=\"07c103c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae48ef elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"1ae48ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"top-view-laptop-with-credit-cards-handcuffs\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/top-view-laptop-with-credit-cards-handcuffs-1024x1024.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-075ae61 e-con-full e-flex e-con e-child\" data-id=\"075ae61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67b5dcc elementor-widget elementor-widget-elementskit-accordion\" data-id=\"67b5dcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfe9f49a\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-67b5dcc\">\n                        <a href=\"#collapse-81acaa169f37dfe9f49a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfe9f49a\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfe9f49a\">\n                            \n                            <span class=\"ekit-accordion-title\">2. Online scams: Large-scale fraud<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfe9f49a\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-67b5dcc\" data-parent=\"#accordion-69f37dfe9f49a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Online scams, often carried out via fraudulent e-mails, fake websites or even social networks, take various forms to extract money or information. Cybercriminals exploit the trust of users, especially the less sophisticated, to trick them into making financial transactions or providing confidential information.<\/p><p><strong>Impact :<\/strong> Individuals and small businesses are particularly vulnerable, with a potentially devastating financial impact.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce1d61c e-flex e-con-boxed e-con e-parent\" data-id=\"ce1d61c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b3e1a46 e-con-full e-flex e-con e-child\" data-id=\"b3e1a46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea03e88 elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"ea03e88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"Illustration of virus detection\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/37692-1024x707.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eaa47d2 e-con-full e-flex e-con e-child\" data-id=\"eaa47d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e2341a elementor-widget elementor-widget-elementskit-accordion\" data-id=\"8e2341a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfea2588\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-8e2341a\">\n                        <a href=\"#collapse-81acaa169f37dfea2588\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfea2588\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfea2588\">\n                            \n                            <span class=\"ekit-accordion-title\">3. Business Email Compromise (BEC) scams<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfea2588\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-8e2341a\" data-parent=\"#accordion-69f37dfea2588\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>In this type of attack, cybercriminals hack into or spoof company e-mail accounts to issue fraudulent transfer instructions, which are often very convincing. In Africa, attacks of this kind frequently target multinational companies.<\/p><p><strong>Issues :<\/strong> Financial losses for companies can be substantial, and relationships of trust with business partners are jeopardised.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-471b6dd e-flex e-con-boxed e-con e-parent\" data-id=\"471b6dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-93d73d4 e-con-full e-flex e-con e-child\" data-id=\"93d73d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d4b143 elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"0d4b143\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"Stressed tired African American man touching temples, suffering from headache after long hours work, overworked overwhelmed businessman sitting at desk, feeling unwell\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/stressed-tired-african-american-man-touching-temples-suffering-from-headache-after-long-hours-work-overworked-overwhelmed-businessman-sitting-desk-feeling-unwell-1024x683.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-902efe8 e-con-full e-flex e-con e-child\" data-id=\"902efe8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20f6204 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"20f6204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfea5218\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-20f6204\">\n                        <a href=\"#collapse-81acaa169f37dfea5218\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfea5218\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfea5218\">\n                            \n                            <span class=\"ekit-accordion-title\">4. Digital extortion: harassment through fear<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfea5218\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-20f6204\" data-parent=\"#accordion-69f37dfea5218\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Digital extortion attacks involve threatening a person or business with disclosure of confidential information or disruption of operations if a sum of money is not paid. These threats are intensifying with advances in technology, making digital blackmail more commonplace.<\/p><p><strong>Consequence:<\/strong> This threat puts the reputation and safety of victims at risk, as well as causing financial losses.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ddb175 e-flex e-con-boxed e-con e-parent\" data-id=\"1ddb175\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e2c854d e-con-full e-flex e-con e-child\" data-id=\"e2c854d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54a3adb elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"54a3adb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"html-css-collage-concept-with-hacker\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/html-css-collage-concept-with-hacker-1024x683.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-174c91d e-con-full e-flex e-con e-child\" data-id=\"174c91d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc9f97 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"4bc9f97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfea8283\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-4bc9f97\">\n                        <a href=\"#collapse-81acaa169f37dfea8283\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfea8283\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfea8283\">\n                            \n                            <span class=\"ekit-accordion-title\">5. Botnets : Networks of infected machines<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfea8283\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-4bc9f97\" data-parent=\"#accordion-69f37dfea8283\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>A botnet is a network of hacked devices controlled remotely by an attacker. These networks are used for massive attacks, particularly DDoS (Distributed Denial of Service) attacks. In Africa, the growing use of connected devices amplifies this risk.<\/p><p><strong>Why is this a concern?<\/strong> Botnets enable large-scale attacks, capable of paralysing websites or critical systems.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-233a7ff e-flex e-con-boxed e-con e-parent\" data-id=\"233a7ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e9b511 e-con-full e-flex e-con e-child\" data-id=\"3e9b511\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d93e7cc elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"d93e7cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"Scam Virus Spyware Malware Antivirus Concept\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/scam-virus-spyware-malware-antivirus-concept-1024x707.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bdfadb4 e-con-full e-flex e-con e-child\" data-id=\"bdfadb4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-913f002 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"913f002\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfeadbc2\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-913f002\">\n                        <a href=\"#collapse-81acaa169f37dfeadbc2\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfeadbc2\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfeadbc2\">\n                            \n                            <span class=\"ekit-accordion-title\">6. Phishing: Fraud by phishing<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfeadbc2\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-913f002\" data-parent=\"#accordion-69f37dfeadbc2\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Phishing is a technique whereby cybercriminals pose as legitimate institutions to steal information, such as bank details or passwords. In Africa, phishing remains one of the most frequent cyber attacks, affecting individuals and businesses of all sizes.<\/p><p><strong>Impact :<\/strong> Victims are often unsuspecting users who provide their information unsuspectingly.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0bd39e e-flex e-con-boxed e-con e-parent\" data-id=\"c0bd39e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cc045d5 e-con-full e-flex e-con e-child\" data-id=\"cc045d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e4eaa1 elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"0e4eaa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"laptop-with-lock-chain-arrangement\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/11\/laptop-with-lock-chain-arrangement-1024x683.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d816e9a e-con-full e-flex e-con e-child\" data-id=\"d816e9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f371a9 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"5f371a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69f37dfeb0229\">\n\n            \n                <div class=\"elementskit-card active\">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-5f371a9\">\n                        <a href=\"#collapse-81acaa169f37dfeb0229\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-81acaa169f37dfeb0229\" aria-expanded=\"true\" aria-controls=\"Collapse-81acaa169f37dfeb0229\">\n                            \n                            <span class=\"ekit-accordion-title\">7. Attacks on critical infrastructures<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-open icon-right icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n                                        <i aria-hidden=\"true\" class=\"icon-closed icon-right icon icon-up-arrow\"><\/i>                                    <\/div>\n\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-81acaa169f37dfeb0229\" class=\"show collapse\" aria-labelledby=\"primaryHeading-0-5f371a9\" data-parent=\"#accordion-69f37dfeb0229\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <p>Cybercriminals are increasingly targeting critical infrastructure, such as energy, transport and telecommunications networks. These infrastructures are strategic, and destabilising them has serious consequences for the economy and national security.<\/p><p><strong>Major risk :<\/strong> Attacks can cause massive disruption to public services, with a considerable impact on society and the economy.<\/p>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1d2d2c e-flex e-con-boxed e-con e-parent\" data-id=\"e1d2d2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94e2932 elementor-widget elementor-widget-spacer\" data-id=\"94e2932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c6ef48 elementor-widget elementor-widget-elementskit-heading\" data-id=\"8c6ef48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title\">How can CediTech help organisations protect themselves from? <span><span>these threats<\/span><\/span><\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider\"><div class=\"elementskit-border-divider\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f469f0a e-flex e-con-boxed e-con e-parent\" data-id=\"f469f0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-106d8a7 elementor-widget elementor-widget-text-editor\" data-id=\"106d8a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CediTech offers specialised cybersecurity training to help African organisations protect themselves against these risks. By training tomorrow's talent, we will enable you to detect, prevent and respond to cyber attacks, while building a resilient digital ecosystem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-192f8d2 e-flex e-con-boxed e-con e-parent\" data-id=\"192f8d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-28b92dc e-con-full e-flex e-con e-child\" data-id=\"28b92dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04c358f elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"04c358f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg lazyload\" style=\"background-image:inherit;\" role=\"img\" aria-label=\"Hologram projector screen with cloud system technology\" data-bg-image=\"url(https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/09\/hologram-projector-screen-with-cloud-system-technology-1024x683.jpg)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tTogether, let's build a secure digital future for Africa.\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/forms.office.com\/pages\/responsepage.aspx?id=Ff5r3ykS8k-OkXIcllAdG1XXO5tTdfNMoE2oFDwWN39UNk5VS0lGNzJHS1ZKV0xGUUc1RDhHVTMwNy4u&#038;origin=lprLink&#038;route=shorturl\">\n\t\t\t\t\t\tJoin us\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The 7 major cyber security threats in Africa According to the 2024 Interpol Cyber Threat Assessment Report, Africa is the...<\/p>","protected":false},"author":1,"featured_media":18787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[95],"tags":[94],"class_list":["post-1104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ceditech","tag-ceditech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.6 (Yoast SEO v23.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique - Ceditech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceditech.ci\/en\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique\" \/>\n<meta property=\"og:description\" content=\"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique Selon le Rapport Interpol de 2024 sur l\u2019\u00e9valuation des cyber menaces en&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceditech.ci\/en\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\" \/>\n<meta property=\"og:site_name\" content=\"Ceditech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ceditech.ci\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-12T10:10:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-12T17:30:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cedproduct1stg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CEDITECH01\" \/>\n<meta name=\"twitter:site\" content=\"@CEDITECH01\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cedproduct1stg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\"},\"author\":{\"name\":\"cedproduct1stg\",\"@id\":\"https:\/\/ceditech.ci\/#\/schema\/person\/395013a45c94afce0900e83b438dab79\"},\"headline\":\"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique\",\"datePublished\":\"2024-11-12T10:10:53+00:00\",\"dateModified\":\"2024-11-12T17:30:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\"},\"wordCount\":704,\"publisher\":{\"@id\":\"https:\/\/ceditech.ci\/#organization\"},\"image\":{\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg\",\"keywords\":[\"Ceditech\"],\"articleSection\":[\"Ceditech\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\",\"url\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\",\"name\":\"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique - Ceditech\",\"isPartOf\":{\"@id\":\"https:\/\/ceditech.ci\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg\",\"datePublished\":\"2024-11-12T10:10:53+00:00\",\"dateModified\":\"2024-11-12T17:30:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage\",\"url\":\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg\",\"contentUrl\":\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"Computer monitor showing hacked system alert message flashing on screen, dealing with hacking and cyber crime attack. Display with security breach warning and malware threat. Close up.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ceditech.ci\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ceditech.ci\/#website\",\"url\":\"https:\/\/ceditech.ci\/\",\"name\":\"Ceditech\",\"description\":\"Ensemble, d\u00e9veloppons vos comp\u00e9tences professionnelles.\",\"publisher\":{\"@id\":\"https:\/\/ceditech.ci\/#organization\"},\"alternateName\":\"Ceditech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ceditech.ci\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ceditech.ci\/#organization\",\"name\":\"Ceditech\",\"alternateName\":\"Ceditech\",\"url\":\"https:\/\/ceditech.ci\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ceditech.ci\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/cropped-Sans-titre-4_Plan-de-travail-1-copie.png\",\"contentUrl\":\"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/cropped-Sans-titre-4_Plan-de-travail-1-copie.png\",\"width\":2193,\"height\":642,\"caption\":\"Ceditech\"},\"image\":{\"@id\":\"https:\/\/ceditech.ci\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ceditech.ci\",\"https:\/\/x.com\/CEDITECH01\",\"https:\/\/www.linkedin.com\/company\/ceditech24\/\"],\"description\":\"Le Centre d\u2019Excellence en Technologie et Innovation (CEDITECH), est d\u00e9di\u00e9 \u00e0 la formation de professionnels qualifi\u00e9s dans les domaines les plus dynamiques de l\u2019industrie num\u00e9rique. Nous sommes fiers de collaborer avec des experts de l\u2019industrie et des institutions acad\u00e9miques de renomm\u00e9e internationale pour offrir des certifications reconnues mondialement. Ces partenariats nous permettent d\u2019assurer que nos programmes sont toujours \u00e0 jour avec les derni\u00e8res tendances et technologies, tout en offrant des opportunit\u00e9s uniques pour nos \u00e9tudiants.\",\"email\":\"info@ceditech.ci\",\"telephone\":\"27 22 5 35968\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ceditech.ci\/#\/schema\/person\/395013a45c94afce0900e83b438dab79\",\"name\":\"cedproduct1stg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ceditech.ci\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eca25920ae7e64b2ccd086f0248b9ede0418a0f1a0aec1eeaea7df69807a8303?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eca25920ae7e64b2ccd086f0248b9ede0418a0f1a0aec1eeaea7df69807a8303?s=96&d=mm&r=g\",\"caption\":\"cedproduct1stg\"},\"sameAs\":[\"https:\/\/ceditech.ci\"],\"url\":\"https:\/\/ceditech.ci\/en\/author\/cedproduct1stg\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique - Ceditech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceditech.ci\/en\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/","og_locale":"en_GB","og_type":"article","og_title":"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique","og_description":"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique Selon le Rapport Interpol de 2024 sur l\u2019\u00e9valuation des cyber menaces en&#8230;","og_url":"https:\/\/ceditech.ci\/en\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/","og_site_name":"Ceditech","article_publisher":"https:\/\/www.facebook.com\/ceditech.ci","article_published_time":"2024-11-12T10:10:53+00:00","article_modified_time":"2024-11-12T17:30:30+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg","type":"image\/jpeg"}],"author":"cedproduct1stg","twitter_card":"summary_large_image","twitter_creator":"@CEDITECH01","twitter_site":"@CEDITECH01","twitter_misc":{"Written by":"cedproduct1stg","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#article","isPartOf":{"@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/"},"author":{"name":"cedproduct1stg","@id":"https:\/\/ceditech.ci\/#\/schema\/person\/395013a45c94afce0900e83b438dab79"},"headline":"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique","datePublished":"2024-11-12T10:10:53+00:00","dateModified":"2024-11-12T17:30:30+00:00","mainEntityOfPage":{"@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/"},"wordCount":704,"publisher":{"@id":"https:\/\/ceditech.ci\/#organization"},"image":{"@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage"},"thumbnailUrl":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg","keywords":["Ceditech"],"articleSection":["Ceditech"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/","url":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/","name":"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique - Ceditech","isPartOf":{"@id":"https:\/\/ceditech.ci\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage"},"image":{"@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage"},"thumbnailUrl":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg","datePublished":"2024-11-12T10:10:53+00:00","dateModified":"2024-11-12T17:30:30+00:00","breadcrumb":{"@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#primaryimage","url":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg","contentUrl":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-scaled.jpg","width":2560,"height":1440,"caption":"Computer monitor showing hacked system alert message flashing on screen, dealing with hacking and cyber crime attack. Display with security breach warning and malware threat. Close up."},{"@type":"BreadcrumbList","@id":"https:\/\/ceditech.ci\/les-7-grandes-menaces-de-cybersecurite-en-afrique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ceditech.ci\/"},{"@type":"ListItem","position":2,"name":"Les 7 grandes menaces de cybers\u00e9curit\u00e9 en Afrique"}]},{"@type":"WebSite","@id":"https:\/\/ceditech.ci\/#website","url":"https:\/\/ceditech.ci\/","name":"Ceditech","description":"Ensemble, d\u00e9veloppons vos comp\u00e9tences professionnelles.","publisher":{"@id":"https:\/\/ceditech.ci\/#organization"},"alternateName":"Ceditech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceditech.ci\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ceditech.ci\/#organization","name":"Ceditech","alternateName":"Ceditech","url":"https:\/\/ceditech.ci\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ceditech.ci\/#\/schema\/logo\/image\/","url":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/cropped-Sans-titre-4_Plan-de-travail-1-copie.png","contentUrl":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/cropped-Sans-titre-4_Plan-de-travail-1-copie.png","width":2193,"height":642,"caption":"Ceditech"},"image":{"@id":"https:\/\/ceditech.ci\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ceditech.ci","https:\/\/x.com\/CEDITECH01","https:\/\/www.linkedin.com\/company\/ceditech24\/"],"description":"Le Centre d\u2019Excellence en Technologie et Innovation (CEDITECH), est d\u00e9di\u00e9 \u00e0 la formation de professionnels qualifi\u00e9s dans les domaines les plus dynamiques de l\u2019industrie num\u00e9rique. Nous sommes fiers de collaborer avec des experts de l\u2019industrie et des institutions acad\u00e9miques de renomm\u00e9e internationale pour offrir des certifications reconnues mondialement. Ces partenariats nous permettent d\u2019assurer que nos programmes sont toujours \u00e0 jour avec les derni\u00e8res tendances et technologies, tout en offrant des opportunit\u00e9s uniques pour nos \u00e9tudiants.","email":"info@ceditech.ci","telephone":"27 22 5 35968"},{"@type":"Person","@id":"https:\/\/ceditech.ci\/#\/schema\/person\/395013a45c94afce0900e83b438dab79","name":"cedproduct1stg","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ceditech.ci\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eca25920ae7e64b2ccd086f0248b9ede0418a0f1a0aec1eeaea7df69807a8303?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eca25920ae7e64b2ccd086f0248b9ede0418a0f1a0aec1eeaea7df69807a8303?s=96&d=mm&r=g","caption":"cedproduct1stg"},"sameAs":["https:\/\/ceditech.ci"],"url":"https:\/\/ceditech.ci\/en\/author\/cedproduct1stg\/"}]}},"featured_image_src":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-600x400.jpg","featured_image_src_square":"https:\/\/ceditech.ci\/wp-content\/uploads\/2024\/08\/jo-2024-cyber-securite-transnumerik-abidjan-senegal-cloud-600x600.jpg","author_info":{"display_name":"cedproduct1stg","author_link":"https:\/\/ceditech.ci\/en\/author\/cedproduct1stg\/"},"_links":{"self":[{"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/posts\/1104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/comments?post=1104"}],"version-history":[{"count":0,"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/posts\/1104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/media\/18787"}],"wp:attachment":[{"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/media?parent=1104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/categories?post=1104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ceditech.ci\/en\/wp-json\/wp\/v2\/tags?post=1104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}