Connect with us


Sidmach answers question on how evolving technology affects cyberseurity in Nigeria



In this thought leadership piece, Sidmach Technologies Nigeria Limited “Sidmach”, identified six ways evolving technology impacts cybersecurity in Nigeria.

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

In a computing context, security includes both cybersecurity and physical security.

The Evolving Technology

The dynamic technology era affects cybersecurity more than anyone could imagine. The degree of cybercrimes has increased exponentially and this cannot be divorced from the growth of technology.

As technology expands and develops, so do the cybercrimes that are committed. Providentially, as technology has advanced, so has the potential ability to seek out cybercrimes before they occur and protect people when they happen.

It’s no doubt that we have witnessed a tremendous growth in technology in Nigeria, accompanying this also are series of cyber attacks, ranging from corporate security breaches to individual accounts being hacked.

One of the most arguable elements of cybersecurity is the fast-paced and constantly evolving nature of technology and security risks.

The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against.

Organizations need to understand the different ways the ever-evolving technology is affecting cybersecurity, this will enable companies design processes to protect their networks and data from cyber attack.

Spear Phishing

Pishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Unlike regular phishing emails that target random people, culprits who normally lead spear phishing scams are seeking information for monetary gain; business secrets or private information.

Spear phishing occurs when hackers target employees through emails that appear to be from colleagues within their own organizations, allowing cybercriminals to steal personal information. With the progressive technology available today, hackers are able to send emails to employees disguised as others within the company – making this a substantial cybersecurity risk.

This is common with the banking sectors in Nigeria, where bank customers receive a random email purportedly to be from their banks, asking for BVN numbers and other personal information.

Sidmach hqrts in Lagos

Corporate Security Breaches

Most of these corporate security breaches happen when hackers exploit employees through social engineering and scams.

With advancements in technology, hackers are becoming more skilled at finding loopholes and cracks in corporate security systems and can easily gain access to protected files and data, posing a great cybersecurity threat.

Identity Fraud

Those engaged in cyber crimes are increasingly using social media to engage in identity theft schemes, and lure individuals to download malicious codes or expose passwords. Experienced hackers can easily hack into users social media accounts and later use that information to venture into a personal email account, work email account and banking information.

The average user shares a lot of information on social media sites; most reveal a person’s name, age, birthday, hometown and family members, while others can go as far as revealing addresses, phone numbers and even up to the minute location updates. Some of this information can reveal just enough for a hacker to find the opportunity and steal someone’s identity online.

Data has Gone Digital

Hard copy information is gradually phasing out – practically everything is going digital these days. Though often protected by a password, most information is stored on a shared network (Shared network is a device or piece of information on a computer that can be remotely accessed from another computer, typically via a local area network or an enterprise intranet, transparently as if it were a resource in the local machine) As a result, a hacker could gain access to the network and obtain valuable information that could put individuals or businesses at risk.

Cloud Computing

It’s obvious most businesses are not gravitating towards cloud computing. As more businesses shift to cloud computing and save documents and information to cloud networks poses an additional cybersecurity risk.

Most businesses now found this option attractive, as cloud computing and storage is extremely efficient and cost-effective. However, certain sophisticated security measures must be put in place to protect information in the cloud. While this technology is progressively emerging, it is expedient for companies to implement security precautions to combat the evolving trends.

Mobile Security Breaches

As mobile technology adoption continues to grow in Nigeria, so are mobile cybersecurity threats. Currently, about 30 percent of cell phone owners have smartphones, which hold more data than the older alternative models.

Every new phone, tablet and mobile device serves as an additional opportunity for a cyber attacker to gain access to someone’s personal data.

As many mobile devices can be plugged into computers to be charged, sharing charging ports with others can create malware issues for many different devices.

As noted above, with the expanding smartphone market in Nigeria, people are becoming more technologically savvy and need to be educated as technology develops. Proper training and sensitization should be done so that the company’s workforce understands the cybersecurity threats, and how to avoid them.

Employers can also put measures in place to mitigate against possible cyber attacks that might emanate from their employers.  With Enterprise Mobility Suite Companies can keep their employees productive on their favourite apps and devices and still keep company data protected.

With the upward progression in technology, the presence of hackers and other cybersecurity threats are also on the rise. With increased awareness and knowledge of technology, from consumers and hackers alike, the risks of cyber fraud are heightened. In order for individuals and corporate organizations to protect their information online, it is important for security precautions to be taken to protect against cybersecurity breaches. Sidmach offers security solutions that help companies keep their data safe and protected from malwares and hackers.  Click here for Sidmach’s range of security solutions

NB: This article first appeared on Sidmach’s LinkedIn page.

Follow us on twitter:

Like our page on Facebook