ADVERTISEMENT
TechEconomy
Wednesday, June 4, 2025
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » Why Employee Collaboration is Key for Cybersecurity | By Emmanuel Asika 

Why Employee Collaboration is Key for Cybersecurity | By Emmanuel Asika 

Techeconomy by Techeconomy
March 29, 2023
in Security
0
Top Cybercrime Trends Organisations Should Take Note of in 2023 by Emmanuel Asika
Emmanuel Asika

Emmanuel Asika

RelatedPosts

Phishing, vishing, and smishing attacks

How to Spot Phishing, Vishing and Smishing

June 4, 2025

SMS Scams Surge 73% | Data Finds Key Trends

June 2, 2025

Many will hate to admit it, but it seems that, perhaps, it has become quite lucrative these days to be a cybercriminal.  

Firstly, it is a thriving business. For instance, according to the FBI, there was a 207% increase in in reported case of cybercrime reports between 2008 and 2021, and almost $7 billion (₦3,223,080,000,000) in losses last year. In Nigeria, the peril of cybercrimes recorded a massive rise in the first six months of 2022, “with phishing and scams hitting 174%”.

According to the Economic and Financial Crimes Commission (EFCC) well over 2,800 persons were convicted of cybercrimes in the country last year, and the Consumer Awareness and Financial Enlightenment Initiative (CAFEI) has projected a $6 trillion loss by 2030 to cybercrime within and outside Nigeria.

Secondly, it has no entry requirement – yes, it is that easy and, quite cheap. Imagine this – the typical cost of compromised remote access credentials costs about ₦2,302 and can simply be bought on the dark web. Cyber crooks use these passes to access their prey’s enterprise networks.

A report, The Evolution of Cybercrime, showed that 75% of advertisements for malware and 91% for exploits  costs less than ₦4,604.40. Some years ago, it was much more expensive. For instance, as of 2009, cybercriminals paid well over ₦3.6 million for a standard malware kit.

Worse still, it has become increasingly easier than ever before for these hackers to work together in a specialized and concerted secretive supply chain.

They have built fortes, proposing unique services like hiring of huge botnets to convey a customer’s preferred malware to thousands of targets, or hackers-for-hire who take full advantage of the destruction caused by ransomware – spreading an invasion of weak points in a network.

The result of all these is that workers in scattered workplaces around the globe are now in more danger than ever before.

The unclear distinction between private and work devices means that hybrid staff are not always shielded by enterprise defenses, thus the risk of attacks is always there.

But there is a way out, and it lies with the employees who are usually the first line of defense, and they must work together. With computer crime now a part of how we do business, and growing, the only way to beat criminals is collaborating with one another to defend ourselves.

Knowing your enemies’ strategy 

Hackers the world over betray trust in daily interfaces and exchanges online, mostly via emails, to gain access to systems. It is a known fact that email remains the most common means for hackers to secure illegal access to networks, and once they are in, they try to monetize their access—deactivating the group’s backups, stealing delicate information, and installing ransomware.

The effect of such violation can be grievous, leading to operational interruption, repairs, affect an organisation’s name, and lead to exposure of trade secrets and loss of intellectual property.

As a result, corporate groups and their employees must work together to fortify their lines in this highly increasing risky atmosphere.

Setting up your protective line  

First, all employees must be conscious of the methods of hackers and promptly report any suspicious behaviour. They must also understand their respective roles in the defense of their organisation’s cyber systems.

The employers, on their part, must back these endeavors by inspiring a positive security culture where employees are given clear instructions to be watchful for phishing and IP protection, ask for help, collaborate on ways to advance cyber safety, and teach coworkers and family members.

As a group, companies and organisations should place emphasis on understanding the basics, constantly working on their resilience, and acting as a team to lessen their risk of exposure.

Quality security begins with IT asset detection – you can only protect the devices, software and systems being used by your workers. The next thing is to adhere to best practices in susceptibility management and multidimensional authentication, while putting in place the personnel, procedures, and know-how to spot, thwart, and recover from likely attacks.

This entails anticipating and planning for the most unpleasant of scenarios, executing procedures to reduce supply chain and insider risks, and rehearsing your response. Such rehearsal drills are not only important in getting you ready for the real attacks when they come, but also helps to expose hitherto unknown problems and inspire process improvements.

An organisation can also exploit the advantages of its security investments by closing known common attack routes, especially malware sent via email and the web, which can be nullified using prevention technologies like the hardware-enforced isolation of HP Sure Click Enterprise.

Such solutions help protect systems not by detecting malicious activity, but by allowing staffs to undertake normal daily routines, including risky undertakings like opening of email attachments safely and shielding IT departments against unidentified threats.

Collaborating with industry peers 

Cybersecurity is a collaborative endeavor. Organisations can confidently strengthen the kind of actions and habits they will like their staff to adopt by vigorous and regular awareness sessions and exercises tailored to their needs. A good example is HP’s recently released noir–inspired cybersecurity training film for its employees.

This will help the organisation build a security culture, with staff encouraged to individually manage risks.

It must be pointed out too that these collaborations should not only be internal (within organisations), but also with other players in the industry. Such external cooperation, including sharing of threat intel, will help the organisation to gauge its cyber security strength and performance, equip it with current information on cybercrime trends and risks, and how best to stay ahead of cybercriminals in the current year, and in years to come.

Emmanuel Asika is the Country Head, HP Nigeria 

Loading

Advertisements
MTN ADS

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: cybersecurityEmmanuel AsikaHP Nigeria
Previous Post

e-mobility Innovators Unlocking US$3.65bn Motorcycle Market in SSA – PREO report

Next Post

Stanbic IBTC Bank Completes First Inbound Commercial Transaction on PAPSS

Techeconomy

Techeconomy

Related Posts

Phishing, vishing, and smishing attacks
Security

How to Spot Phishing, Vishing and Smishing

by Techeconomy
June 4, 2025
0

Phishing, vishing, and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. These...

Read more
SMS Scams on the rise

SMS Scams Surge 73% | Data Finds Key Trends

June 2, 2025
IHS Nigeria and Tower sites security

IHS Nigeria Commissions 65 Patrol Vehicles to Enhance Telecoms Tower Site Security

June 2, 2025
Cyberdefence SensePost

SensePost debuts SecDevOps: A developer-oriented Security Training Course

May 29, 2025
Check Point to acquire Veriti

Check Point to Acquire Veriti Cybersecurity

May 28, 2025
Autonomous Cyber threats | Nigeria - Transparent Transformation, Bridging digital divide, Nigerian Businesses and cybersecurity by Oluwole Asalu

Nigeria Must Prepare for the Rise of Autonomous Cyber Threats

May 27, 2025
Next Post
PAPSS

Stanbic IBTC Bank Completes First Inbound Commercial Transaction on PAPSS

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

TECH TALK EPISODE 2
byTecheconomy

PRODUCTIVITY AND WORK-Life Balance

TECH TALK EPISODE 2
TECH TALK EPISODE 2
May 22, 2025
Techeconomy
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

Translate »
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.