ADVERTISEMENT
TechEconomy
Tuesday, May 20, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » Why Building a Culture of Cyber Awareness Should Start at the Top

Why Building a Culture of Cyber Awareness Should Start at the Top

Techeconomy by Techeconomy
August 27, 2022
in Security
1

RelatedPosts

social media blogging and death of influence | Identity theft

Social Media: Report Shows Spike in Identity Fraud

May 20, 2025

Ikot Ekpene Declaration: Nigerian Judges Commit to Upholding Global Digital Rights Standards

May 20, 2025

No one is immune to the possibility of a cyberattack on their personal or company device, leaving them vulnerable to the theft of data, confidential information, banking details and more. 

Large corporations, public entities, individuals, SMMEs – virtually anyone can be the target of skilled and professional hackers and cybercriminals, which is why building a strong culture of cyber awareness should be top of mind for SA business leaders,  says Ryan Mer, CEO at eftsure Africa,  a Know Your Payee™ (KYP) platform provider. 

Ryan Mer on social engineering
United BANK
Ryan Mer of eftsure, Johannesburg South Africa. Photograph: John Hogg

As more companies recognise the importance of taking measures to protect themselves and their customers by installing sophisticated malware detection systems, and utilising the services of cyber security experts, they may not be assisting their internal stakeholders who are the custodians of much of their data, otherwise known as employees, to safeguard themselves against attack.

Companies frequently organise wellness days for physical and mental health awareness, or team building and feel-good events, but few, if any, take steps to teach safe and healthy digital practices.

Setting an example from the top of the company down is the best place to start instilling good ‘digital hygiene’ at every level of a company’s structure.

With the advent of remote working, and load shedding that has forced many people to seek connectivity in coffee shops, internet cafes and on other public networks, our cell phones, laptops, and tablets are even more exposed.

The first step in leading from the top is being a pioneer of cyber security measures and consistently communicating these to staff through customised education and training. 

It’s equally important to appreciate that there’s a technical component to cyber awareness that can present a learning curve for some staff members.

https://techeconomy.ng/2022/08/cybersafe-foundations-nogofallmaga-community-releases-investment-scam-handbook/

This makes having robust, automated systems that serve as an extra check and balance critical for businesses today, especially those in the SME sector, who will have a much harder time recovering from the financial consequences following a security breach or act of fraud.

United BANK

Training in identifying suspect emails and dodgy attachments is also useful for staff, who may easily be convinced to proceed with actioning a payment request from the CFO or open a proof of payment document from an unknown vendor. Most of us know that revealing a PIN number or One Time PIN is a complete no-no.

But it bears repeating that there isn’t a reputable company anywhere that will call and ask you to disclose this information, so helping employees to understand the consequences of gullibility can also go a long way in preventing a cyber-disaster. Cyber threats are often thought of alongside images of a lone hacker in a hoodie, but because cyber criminals are financially motivated, they run their operations like a business and can be very persuasive when targeting victims.

Payment fraud is amongst the most common weaknesses in companies and occurs when invoice payments and salary runs are being processed. A platform like eftsure can mitigate the risks of such fraud, by automatically verifying and re-checking the integrity of the payment details of every company payment prior to payment release.

Real-time prevention is the first line in a company’s defence against fraud and can avert loss of funds, lengthy system shutdowns, forensic investigations and other costly remediation measures after a security breach has been detected.

Most internal IT departments can teach your staff preventative measures to avoid cyberattacks, but whether you use in-house resources or outsource to experts in the cyber security field, it is important that your company first and foremost takes steps to protect itself.

By demonstrating that you take everyone’s cyber safety seriously – both inside and outside the organisation – you will be showing responsible leadership and awareness that modern-day threats pose to the stability of your enterprise.

Loading

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares

Tags: Cyber awarenessRyan Mer
Previous Post

Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert

Next Post

Stanbic IBTC Pension Managers Deepens Access to Pension with New Branch

Techeconomy

Techeconomy

Related Posts

social media blogging and death of influence | Identity theft
Security

Social Media: Report Shows Spike in Identity Fraud

by Destiny Eseaga
May 20, 2025
0

Latest report indicate that 85% of adults globally want to do more to protect their online privacy, which is a key...

Read more
Ikot Ekpene Declaration

Ikot Ekpene Declaration: Nigerian Judges Commit to Upholding Global Digital Rights Standards

May 20, 2025
Invinsense by Infopercept: Cybersecurity Offering Tailored for Fintechs

Mart Networks Unveils Comprehensive Cybersecurity Offering Tailored for Fintechs

May 19, 2025
Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

May 15, 2025
Sophos MSP Elevate

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025
CyberDome and Cato Networks

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

May 12, 2025
Next Post

Stanbic IBTC Pension Managers Deepens Access to Pension with New Branch

Comments 1

  1. Pingback: Why Building a Culture of Cyber Awareness Should Start at the Top – TechEconomy.ng - Heal Security Inc

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.