• News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
Monday, December 22, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Finance
  • StartUPs
  • TechTAINMENT
  • Guest Writer
  • Digital Assets
  • IndustryINFLUENCERS
  • Environment
  • Macro Monday
ADVERTISEMENT

Home » AfriTECH 3.0: Digital Encode Hints How Emerging Techs Drive Cyber Trends

AfriTECH 3.0: Digital Encode Hints How Emerging Techs Drive Cyber Trends

Techeconomy by Techeconomy
November 27, 2023
in Security
Reading Time: 2 mins read
0
Olaifa Opeyemi at AfriTECH 3.0 for Digital Encode

L-r: Olaifa Opeyemi, Cybersecurity Consultant, Digital Encode Limited, responding to questions during a fireside chat  with Joan Aimengheuwa, senior Content Writer at TechEconomy, at AfriTECH 3.0

RelatedPosts

NCS Warns FIRS-France Deal Must Not Compromise Nigeria’s Digital Sovereignty

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

UBA
Advertisements

Digital Encode Limited, a prominent consulting and integration firm, has stated that in its 20 years of existence, it has certified numerous organizations with various certifications.

These span from ISO certifications to conducting Payment Card Industry Data Security Standards (PCI-DSS) for both Nigerian and international companies.

Digital Encode, which prides itself as the number one information technology assurance company in Africa, specializes in the design, management security of business-critical networks, telecommunications environments and other information technology infrastructures.

Speaking during a Fireside chat with Joan Aimuengheuwa, a senior Content writer with Techeconomy, at the Africa Tech Alliance (AfriTECH 3.0) Forum held at The Providence Hotel, Ikeja GRA Olaifa Opeyemi, a Cybersecurity Consultant at Digital Encode Limited said the company known for solving multifaceted, complex enterprise network security and audit problems, will keep on working tirelessly to remain ready in the ever-evolving digital space.

Responding to a question on cybersecurity threats in Africa, Opeyemi highlighted a noticeable surge due to ongoing advancements in the digital landscape, emerging technologies, and the proliferation of smart devices.

There was a time of web applications; now, it’s all about mobile applications. The more technology we introduce, the greater the threats. There’s a corresponding increase in malicious attempts to exploit these technologies,” Opeyemi explained. “We’ve witnessed a rise in cybersecurity threats, from ransomware and malware to business logic attacks. Social engineering, especially phishing, has become rampant. Additionally, there’s a surge in cryptocurrency attacks, notably cryptojacking.”

Explaining Cryptojacking as a technique where attackers infiltrate a user’s device with malware, covertly using its computational power and resources to mine cryptocurrencies for the attackers’ benefit without the user’s knowledge or consent

MTN New

Discussing positive developments, Opeyemi noted increased data protection efforts in Nigeria post the enforcement of the data protection bill by President Bola Tinubu.

She highlighted similar efforts in South Africa and Egypt through the implementation of POPIA (Protection of Personal Information Act), emphasizing the continent’s push towards data protection.

Opeyemi stressed that cybersecurity extends beyond technology to encompass organizational staff. “Even with top-tier technology and security-conscious staff, having processes like password policies is vital,” she emphasized.

Cybersecurity aims at ensuring information confidentiality, integrity, and availability,” Opeyemi explained. “Confidentiality prevents unauthorized access, integrity safeguards against unauthorized modifications, and availability ensures uninterrupted access.”

Regarding safeguarding data against DDoS attacks, Opeyemi recommended employing traffic analysis solutions capable of filtering suspicious traffic to prevent service unavailability.

Lastly, she urged the government to intensify cybersecurity awareness efforts, advocating for its inclusion in educational curricula to foster a cybercrime-free nation from an early age.

0Shares

stanbic
Techeconomy

Techeconomy

Related Posts

Muhammad Sirajo Aliyu Takes Over as the 15th President of Nigeria Computer Society - NCS | FIRS-France

NCS Warns FIRS-France Deal Must Not Compromise Nigeria’s Digital Sovereignty

by Peter Oluka
December 20, 2025
0
0

On December 10, 2025, a handshake between the Federal Inland Revenue Service (FIRS) and France’s tax authority (DGFiP) signaled a...

AI-generated websites

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

by Peter Oluka
December 17, 2025
0
0

Kaspersky has detected a malicious campaign, where attackers leverage AI-generated websites to distribute versions of the legitimate remote access tool...

Cybercriminals Using Popular Turkish, Arabic Books as Bait to Steal Personal Data

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

by Peter Oluka
December 17, 2025
0
0

The Kaspersky Global Research & Analysis Team has uncovered a malware-as-a-service campaign targeting ebook readers across Turkey, Egypt, Bangladesh and...

Nigeria Hit by 4,200 Weekly Cyberattacks as Africa’s Threats Surge

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

by Joan Aimuengheuwa
December 16, 2025
0
0

The data places Nigeria at the centre of a continental problem.

Sophos MITRE ATT&CK Evaluations

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

by Destiny Eseaga
December 13, 2025
0
0

Sophos, a global leader of innovative security solutions for defeating cyberattacks, has announced its best-ever results in the MITRE ATT&CK...

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

by Joan Aimuengheuwa
December 10, 2025
0
0

The global cyber insurance market has reached $20.56 billion in 2025.

Load More
Next Post
Jumia

For Jumia, Investors Must Now Keep the Faith

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
UBA
Advertisements
  • About Us
  • Advertise
  • Careers
  • Contact Us

© 2025 TECHECONOMY.

No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle

© 2025 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.