• News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
Saturday, December 20, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Finance
  • StartUPs
  • TechTAINMENT
  • Guest Writer
  • Digital Assets
  • IndustryINFLUENCERS
  • Environment
  • Macro Monday
ADVERTISEMENT

Home » Basic Cybersecurity Terms Unfamiliar to Top Managers revealed

Basic Cybersecurity Terms Unfamiliar to Top Managers revealed

Techeconomy by Techeconomy
March 29, 2023
in Security
Reading Time: 3 mins read
0
cybersecurity issues for Top Managers | Open Source

Source: Open Access Government

RelatedPosts

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

UBA
Advertisements

Many business executives prefer not to admit a lack of understanding when discussing cybersecurity issues.

A recent Kaspersky study also revealed that up to a third of top managers in South Africa are unfamiliar with such terms as DDoS, botnets, or APTs.

While keeping cybersecurity in mind with every business decision has already become the norm, many executives lack confidence that their cyber spending is being allocated to the most significant risks their organisation is facing.

Kaspersky conducted its own research to help IT and C-level find common ground and explore the root of their misunderstandings.

The Kaspersky poll indicates that C-suite sometimes struggle to understand their IT security peers and are not always ready to show their confusion.

MTN New

In South Africa, 21% of non-IT executives say they would not feel comfortable flagging that they don’t understand something during a meeting with IT and IT security. 38% of them hide their confusion and prefer to clarify everything after the meeting themselves, 38% don’t ask additional questions because they don’t believe the IT peers will be able to explain it in a simple way. 19% feel embarrassed revealing they don’t understand the topic and 29% don’t want to look ignorant in front of IT colleagues.

Also, even though all surveyed top managers regularly discuss security related issues with IT security managers, 30% locally would not be able to explain what a botnet is, what an APT is, or what a DDoS attack is. At the same time Spyware, Malware, Trojan and Phishing appeared to be more familiar for top-mangers.

Which of the following statements best describes your knowledge and understanding of the following threats?

Basic Cybersecurity Terms Unfamiliar to Top Managers revealed
Some top managers admit they have never heard of cybersecurity terms like DevSecOps (10%), SoC (10%) and Pentesting (8%).

“Non-IT top management do not have to be experts in complex cybersecurity terminology and concepts and IT security executives should keep this in mind when communicating with the board,” comments Sergey Zhuykov, Solution Architect at Kaspersky. “To establish efficient cooperation CISO should be able to focus C-level attention precisely on meaningful details and clearly explain what exactly the company is doing to minimise cybersecurity risks. In addition to communicating clear metrics to stakeholders, this approach requires offering solutions instead of problems.”

To ease the communication between IT security and business functions within the company, Kaspersky recommends the following:

  • IT security should be positioned as a driver for growth and innovation in the organisation. To achieve this the IT security team should move away from prohibitive tactics and rather explain how the business can achieve its goals while mitigating cybersecurity risks.
  • CISO should actively engage in operational activities and build relationships with the company’s stakeholders. While fewer than 20% of CISOs have established partnerships with key executives in sales, finance, and marketing, it is hard for them to stay abreast of the needs of the business.
  • When communicating with the board, use arguments based on an overview of threats by experts, your company’s attack status and best practices.
  • Explain to the board what the main responsibilities of the IT security team are. If possible, provide them with an opportunity to walk in a CISO’s shoes to get insights on the most relevant IT security challenges.
  • Allocate cybersecurity investments in tools with proven efficacy and ROI. This means tools that lower the level of false positives, and reduce times of attack detection, the time spent per case and other metrics are important to any IT security team.
0Shares

stanbic
Techeconomy

Techeconomy

Related Posts

AI-generated websites

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

by Peter Oluka
December 17, 2025
0
0

Kaspersky has detected a malicious campaign, where attackers leverage AI-generated websites to distribute versions of the legitimate remote access tool...

Cybercriminals Using Popular Turkish, Arabic Books as Bait to Steal Personal Data

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

by Peter Oluka
December 17, 2025
0
0

The Kaspersky Global Research & Analysis Team has uncovered a malware-as-a-service campaign targeting ebook readers across Turkey, Egypt, Bangladesh and...

Nigeria Hit by 4,200 Weekly Cyberattacks as Africa’s Threats Surge

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

by Joan Aimuengheuwa
December 16, 2025
0
0

The data places Nigeria at the centre of a continental problem.

Sophos MITRE ATT&CK Evaluations

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

by Destiny Eseaga
December 13, 2025
0
0

Sophos, a global leader of innovative security solutions for defeating cyberattacks, has announced its best-ever results in the MITRE ATT&CK...

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

by Joan Aimuengheuwa
December 10, 2025
0
0

The global cyber insurance market has reached $20.56 billion in 2025.

Technological Trends Reshaping International Production | State of Ransomware in Manufacturing and Production 2025

Sophos: Manufacturing Sector Sees Drop in Ransomware, But Spike in Data Theft

by Joan Aimuengheuwa
December 5, 2025
0
0

Quick Read: Manufacturing experienced a 40% encryption rate, reflecting stronger early detection Attackers escalated data theft and extortion to maintain...

Load More
Next Post
Nigeria’s Zone Partners ThetaPay to Monitor, Screen Payments for Illicit Activities

Nigeria’s Zone Partners ThetaRay to Monitor, Screen Payments for Illicit Activities

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
UBA
Advertisements
  • About Us
  • Advertise
  • Careers
  • Contact Us

© 2025 TECHECONOMY.

No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle

© 2025 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.