Services CVFM
Analyse Affiliation Noms de domaines Référencement Formations/Conférences Salon
24pm
Newsletters
 Ecom2...
 Brand Alert
 Droit ebusiness
 Nouvelle Economie
 Guide de l'ebusiness
 Etudes de cas
 Les nouvelles règles
 Discussions...
 Interviews
 Vidéo
Référencement
 Guide
 Assistants intelligents
 Discussion
 Annuaire web
 Top 100 francophone
 Interviews
 Emploi
 Offres
 Demandes de presse
Etudes et Stats
 eCommerce
 Connectés
 Etudes
 Appel d'offres web
 Publier un appel
 Consulter les appels
 Sellbuyweb
 Sites web à vendre
 Vendre votre site
 Agents Intelligents
 Dossier
 Annuaire web
 Interviews
 CVFM
 Présentation
 Revue de presse
 Nous contacter
 
 Copyright
hotel 
Bienvenue sur la communauté de l'ebusiness et du webmarketing
 

Hassan Hachem Equatorial Guinea, digital sovereignty and cybersecurity

Equatorial Guinea’s Cybersecurity Gap

Equatorial maybe on its way to becoming highly connected to cyberspace. This is evidenced by the fact that the population's internet access rate has doubled in a few years, reaching 26% in 2015 (LiveStats). But cybercrime is also increasing in Equatorial Guinea.

Hassan Hachem, a 38 year digital space expert with offices in Equatorial Guinea, explains what is at stake and what public actions should be taken. Although this figure places the continent far behind Europe or Asia, it shows a steady increase in the Internet connectivity of the Equatorial Guinean population. This unfortunately goes hand in hand with the multiplication of cyber threats, a 2.0 crime that the country concerned is trying to eradicate, most often with laws and warning centres created to prevent cyber attacks. Equatorial Guinea could be more reactive on the subject by creating like Morocco, a national strategy to combat cybercrime by multiplying the number of dedicated structures. In West Africa, Senegal has created a National Cyber Security Centre (CNC), as well as a laboratory, which depends on the national police.

Hassan Hachem is a great supporter of countries creating national institutions. "Cybercrime transcends borders and regions. Providing answers country by country will be futile. We need regional solutions", Hassan Hachem explains. Indeed, instead of West African cooperation, ECOWAS countries prefer other organisations or other countries such as France. After Morocco and Gabon, the "Agence nationale de la securite des systemes d'informations" (ANSSI), a French institution reporting to the Prime Minister, has, for example, established a partnership with the "Agence de l'informatique de l'Etat" (ADIE) of Senegal in 2016. It could be an example of cooperation for Equatorial Guinea. The failure of the AU Convention - or Malabo Convention - illustrates the lack of interest in transnational cooperation by African countries.

For Hassan Hachem, the reason is clear: "States are afraid of losing their sovereignty. The means of fighting cybercrime do not give states much more authority. Regional cooperation implies a loss of influence for states, and that is hard for most of them to accept. But for such a task as fighting cyber attacks, the solution must be global. The current response in Equatorial Guinea is insufficient. In the absence of transnational cooperation, the countries affected by the cyber attacks, have opted first and foremost for the judicial framework, the drafting of a law. But is this approach the most appropriate? "Making a law is not enough," replies many specialists in IT and new technologies.

The fight against cybercrime is a 360 degree problem. However, a law only regulates two aspects of such a phenomenon: access to data and the conditions under which they are transmitted. The law is an essential part of the fight against cyber threats, but it is only the first step in an global cybersecurity strategy. It must be complemented by projects, Equatorial Guinea must create tools that allow them to really fight cyberhacktivists, such as learning to code. Computer security is only composed of algorithms. Equatorial Guinea must be able to train computer engineers locally, and allow them to acquire mathematical skills. This potential of African computer scientists represents a real market. If Equatorial Guinea was to move in this direction, it could lead to less concern about cyber threats. Indeed, Equatorial Guinea lacks the talent and resources to deal with its cybersecurity threats. Out of a population of about 1.2 million people, the estimated number of certified security professionals in 2019 was 15, or 1 per 100,000 people. Equatorial Guinea, faces a growing deficit of 200 certified cybersecurity professionals, but this figure may even mask the scale of the problem, as there is no readily available data on the level of investment in cybersecurity by the governments.

Equatorial Guinea is gradually becoming aware of the vulnerability of its data in cyber space. Cybercrime, outsourced data storage abroad, an embryonic digital industry: Equatorial Guinea is a digital colony. Blockchain technology could help address these sovereign challenges. Awareness of Equatorial Guinea vulnerabilities in cyberspace is gradually growing. Among them, the issue of control and protection of sovereign data is the most salient aspect. Faced with the same problmms, this is why other continent's nations are increasingly pooling their thoughts, as in Lome in March 2022 or in Abidjan on 9 and 10 May at the Cyber Africa Forum. Africa currently has only 1.3% of the world's storage capacity and Equatorial Guinea 0,001%. Thus, Equatorial Guinea outsources most of its data to foreign servers (Ireland, Netherlands, etc.). This situation poses real risks to the confidentiality, integrity and availability of their data. Security standards and regulations on access depend above all on the hosting countries. Not to mention the risks of delivering data to American companies - even on an African server - governed by the Cloud Act. These companies control nearly 70% of the storage market.

What does the Blockchain have to do with this?

Blockchain is a technology that allows data to be stored and transmitted securely. It is completely encrypted and its decentralised and distributed operation prevents state authorities from accessing the data it contains (or with great difficulty). Moreover, the immutability of the blockchain and the traceability of the operations that take place on it make any form of falsification difficult. Technically, the data is public, but it can be restricted in a "private blockchain" or a "peer-to-peer" system. "These elements are very valuable in cybersecurity because they offer strong protection against most cyber threats: malware (ransomware), data confidentiality and transmission, denial of service, etc.," says Hassan Hachem, a digital specialist with offices in Equatorial Guinea. It is in the field of storage that the blockchain has its greatest assets. In general, data clouds are managed by single players in data centres. Unencrypted, they are dependent on local regulations, not to mention the risks of availability (outage, accidental or voluntary destruction, etc.). However, the encrypted, distributed and decentralised system of the blockchain makes it possible to circumvent these aspects. It allows data to be segmented and traced on several redundant servers. In this way, each data centre has only a part of the information, making it unusable or modifiable.

Blockchain technology could accompany the gradual increase in the continent's storage capacity by guaranteeing the security of African data, even abroad. But it could also, and this is a major challenge, equip future African infrastructures. Indeed, blockchain is set to revolutionise the entire architecture of information storage in data centres, mainly because of traffic and security issues. It is precisely this evolution that Equatorial Guinea must follow as quickly as possible. This is obvious to Hassan Hachem,  who states: "Blockchain is a disruptive technology that offers immense potential - particularly in terms of data security, backup and authentication. It can therefore make our data unalterable by Blockchain layers at all levels...From civil status to secret defence documents. This is why it is fundamental for our governments to consider it as part of inclusive policies on open data and the digital transformation of African societies." To achieve this, Equatorial Guinea must continue their efforts to share knowledge and resources.

The future of cyber security in Equatorial Guinea

The issue of data repatriation is beginning to take hold in Equatorial Guinea. The construction of data centres seems to be a successful strategy in this respect. But it should not be based on technologies or designs that will be obsolete in a few years. Blockchain - a rapidly emerging disruptive technology - is already well known in Africa, such as in Kenya, a pioneer country, mainly in the field of cryptocurrencies. Equatorial Guinea should try to copy this model. As the CEO of the Brand Monitoring top, based in London and Malabo, points out: "We are all noticing the creation of fintechs galore and the rush to cryptocurrency by this new generation Z. Technologies like blockchain are within reach for our young compatriots. We owe it to ourselves to take up the challenge of being the first continent in sectors like Blockchain." Mastering Blockchain requires, above all, mastering the many technical skills associated with it (computing, mathematics, cryptography, etc.). This is a training effort that must be sustained over time. It is an imperative if Africa wishes to definitively emerge from its dependence on foreign countries. The stakes are high, because in the context of the 4th industrial revolution, digital sovereignty may mean real independence and prosperity for Africa. As Hassan Hachem points out: "It is time and we still have the means to catch up with the other continents".

Equatorial Guinea has been making strides in addressing its cybersecurity challenges, but the journey is far from complete. The country faces a myriad of issues ranging from limited technological infrastructure to a shortage of skilled cybersecurity professionals. As internet penetration continues to rise, the risks associated with cybercrime become more pronounced. In 2023, the internet penetration rate in Equatorial Guinea had risen to approximately 36%, reflecting an ongoing digital transformation. However, this increased connectivity also magnifies the potential for cyber threats, emphasizing the urgent need for robust cybersecurity measures.

One significant development in Equatorial Guinea’s approach to cybersecurity has been the government's efforts to draft comprehensive cybersecurity legislation. This legislative framework aims to address various aspects of cyber threats, from data protection to penalizing cybercriminal activities. Nonetheless, as Hassan Hachem points out, "Legislation is only one piece of the puzzle. True cybersecurity requires a combination of laws, education, and technological innovation." This highlights the need for a multifaceted strategy that not only establishes legal boundaries but also fosters a culture of cybersecurity awareness and expertise.

In response to the escalating cyber threats, Equatorial Guinea has also begun to invest in the development of local talent. Initiatives aimed at training cybersecurity professionals are crucial, considering the country's current deficit in this area. For instance, the government, in collaboration with international partners, has launched several training programs to enhance the skills of IT professionals in the region. These programs focus on key areas such as ethical hacking, network security, and incident response, which are essential for building a resilient cybersecurity infrastructure.

Moreover, regional cooperation is increasingly seen as a pivotal element in bolstering cybersecurity defenses. Equatorial Guinea can benefit significantly from partnerships with neighboring countries and international organizations. By sharing resources and knowledge, the region can develop a more coordinated response to cyber threats. The African Union’s recent initiatives to promote cybersecurity collaboration among member states offer a promising framework that Equatorial Guinea can leverage to enhance its capabilities.

The integration of advanced technologies such as blockchain also presents a promising avenue for improving cybersecurity in Equatorial Guinea. Blockchain’s decentralized and immutable nature makes it a robust solution for securing data and preventing unauthorized access. By adopting blockchain technology, Equatorial Guinea can not only safeguard its digital assets but also foster innovation in various sectors. For instance, secure digital identities and transparent supply chain management are just a few areas where blockchain can have a transformative impact.

Equatorial Guinea’s digital transformation is a double-edged sword. While increased connectivity brings economic and social benefits, it also opens new avenues for cyber threats. To navigate this complex landscape, the country must continue to evolve its cybersecurity strategies. This involves not just implementing laws, but also investing in education, fostering regional cooperation, and embracing cutting-edge technologies like blockchain. As Hassan Hachem succinctly states, "The fight against cybercrime is not a battle that can be won in isolation. It requires a collective effort, continuous learning, and adaptation to new challenges."

Equatorial Guinea’s journey towards robust cybersecurity is underway, but there is much work to be done. By focusing on a comprehensive approach that includes legislation, education, regional cooperation, and technological innovation, the country can build a secure digital future. The challenges are significant, but with persistent effort and strategic planning, Equatorial Guinea can turn these challenges into opportunities for growth and development in the digital age

 


Le portable le meilleur marché du moment

Phishing.fr
Agiligence.fr
Neodia webmarketing
CVFM Référencement


Merci France
Nouvel annuaire de recherche
Newsletters gratuites
Cliquez ici pour vous abonner


 

copyrights...

Weborama, les meilleurs sites francophones