• Hausa Edition
  • Podcast
  • Conferences
  • LeVogue Magazine
  • Business News
  • Print Advert Rates
  • Online Advert Rates
  • Contact Us
Wednesday, May 14, 2025
Leadership Newspapers
Read in Hausa
  • Home
  • News
  • Politics
  • Business
  • Sport
  • Health
  • Entertainment
  • Opinion
    • Editorial
  • Columns
  • Football
  • Others
    • LeVogue Magazine
    • Conferences
    • National Economy
  • Contact Us
No Result
View All Result
  • Home
  • News
  • Politics
  • Business
  • Sport
  • Health
  • Entertainment
  • Opinion
    • Editorial
  • Columns
  • Football
  • Others
    • LeVogue Magazine
    • Conferences
    • National Economy
  • Contact Us
No Result
View All Result
Leadership Newspapers
No Result
View All Result

Protecting Your Business From Cyber Attacks

by Royal Ibeh
2 years ago
in Feature
Cyber Attacks
Share on WhatsAppShare on FacebookShare on XTelegram

Cyberattack is a malicious and deliberate attempt by an individual or organisation to breach the information system of another individual or organisation. 

Advertisement

When targeting businesses or organizations, the hacker’s goal is usually to access sensitive and valuable company resources, such as Intellectual Property (IP), customer data or financial details.

The Economic and Financial Crimes Commission (EFCC) reported that 80 per cent of the 978 convictions it secured as of September 2021, were based on cyber fraud. Another report by Nigeria Inter Bank Settlement System (NIBSS) indicates that within nine months of 2020, fraudsters made 46,126 attempts to breach data-based systems. Sadly, 41,979 of these were successful – representing 91 per cent of the time.

Also, a Survey titled ‘The State of Ransomware 2022′, revealed that 71 per cent of Nigerian businesses were hit by ransomware attacks in 2021 and that the cost of remediation of these attacks for 44 per cent of the businesses was $3.43 million. 

It has been reported that Africa lost $3.5 billion in 2017 to cybercrimes, the Nigerian portion of this sum was $645 million, by far the largest. A year later, it was reported that Nigeria lost $800 million (N288 billion) collectively to cyberattacks in 2018. More broadly, a 2019 report disclosed that Nigeria has lost on average N127 billion ($328,842,878 million) annually to cybercrimes in recent years.

RELATED

Wema Bank As Metaphor For Trust, Shareholder Value

Wema Bank As Metaphor For Trust, Shareholder Value

1 day ago
How To Know If Your Car Service Centre Is Using Genuine Spare Parts

How To Know If Your Car Service Centre Is Using Genuine Spare Parts

1 day ago

 

Types of Cyber Attacks

Ransomware, otherwise known as information hijacking, is an example of cyber attacks, head, IT and Cybersecurity, Nigeria Data Protection Commission (NDPC), Olorunisomo Isola said, adding that, “the attacker uses a code to get access to the organization’s server. The objective is to hold a company’s data hostage until the affected user pays a specific amount, which can often be hefty. These attacks can use email to penetrate a system, but can also be initiated by visiting an infected website, clicking on an online ad with malicious code, or hackers exploiting network vulnerabilities.

“Another one is the Distributed denial-of-service (DDoS). In this case, the attacker floods the system with a high number of simultaneous functions, such as a request to a webpage. The goal is to overwhelm networks, systems, or devices. Malware is a type of malicious software that is designed to damage computers or steal information. Hackers can use malware to delete files, access sensitive information, or disable a computer. In other words, it is intended to take control of or disrupt a target’s computer system or infrastructure.” 

Social engineering represents a catch-all term for various tactics that are used by hackers, Isola disclosed, adding that, these tactics are designed to trick individuals into giving out sensitive or confidential information (e.g: Phishing, Smishing, Vishing, etc.). Another one is Advanced Persistent Threats (APT), which is a sophisticated, sustained cyberattack in which an intruder establishes an undetected presence in a network in order to steal sensitive data over a prolonged period of time, he revealed. 

Man-in-the-middle attack (MITM) is a type of cyber threat in which a hacker intercepts communication between two people to obtain information, Isola averred, adding that on an insecure WiFi network, for example, an attacker could intercept data passing between the victim’s device and the network.

“Insider threat is the potential for an insider to use their authorized access or understanding of an organization to harm that organization. This harm can include malicious, complacent, or unintentional acts that negatively affect the integrity, confidentiality, and availability of the organization, its data, personnel, or facilities. Third-Party Threats are typically contractors or vendors non formal members of an organization, but have been granted some level of access to facilities, systems, networks, or people to complete their work. These threats may be direct or indirect threats,” he stated.

 

Importance of cybersecurity 

It is a known fact that individuals, businesses, organizations, and governments are all potential targets of cyberattacks, hence the need to heighten cybersecurity, to protect oneself from being victim of cyber attacks, Isola advised.

He urged individuals and organizations to maintain a good password policy, adding that, “Maintaining an unpredictable and complex password is a huge step in the right direction. Make sure that you never reuse passwords and change them regularly as and when you’re prompted by an expiry alert. Choosing a strong password is itself the best security measure of all.

Update regularly Isola said, adding that, “the pop-ups that we get from time to time notifying us of updates are not just there to pester us. Such updates do numerous things to help you improve security. One of the best ways to foil breach attempts is to update your operating system and all application software as the new versions have most likely been fine-tuned to prevent current threats.”

There is need to secure the Network, the IT expert said, even as he disclosed that, “Cybercriminals could easily compromise your data without setting foot inside your premises. They can do this by breaking into your network, and it’s far easier for them to do it if your network is unsecured. You can secure all the devices in your network by ensuring that encryption is enabled on your wireless traffic.”

Isola also advocated for proper backing up of data. He said, “Data is the most valued asset of any organization and it’s what criminals want to exploit. Storing and backing up such assets with private information is critical. Backing up data can be considered another line of defense protecting you against ransomware.”

Educate the employees, the IT expert advised, adding that, “Educating your employees about the deadly consequences of security breaches is vital. If a culture of security is adopted at all levels of the organization, from junior staff to the CEO, then it will be far less likely you’ll suffer an otherwise avoidable data breach.

There is also the need to respond promptly to cyber breach, Isola averred, while explaining that with the surge of high-profile attacks targeting sensitive data assets, developing a breach response plan in advance helps in triggering a quick response in the wake of an incident. “Also install centralized firewalls. Firewalls are the first line of defense in network security. A suitably configured firewall acts as a barrier between networks with differing levels of trust. It is vital that you keep the local firewall on all the time as this is the best way you can arm your network against malicious attacks.

“Encrypted Transmission, because stolen encrypted data is of no value to cybercriminals. The power of cryptography is such that it can restrict access to data and can render it useless to those who do not possess the key. Using encryption is a big step towards mitigating the damages of a security breach. Don’t forget to always update your antivirus software.

“Make sure that you have an updated antivirus, antispyware and anti-malware software installed so that your server is continuously protected and monitored. Such software prevents malicious programs from stealing or destroying data assets,” he advised. 

The implementation of technical and organisational measures for information security is of utmost importance in today’s digital age. The measures provide a robust framework for protecting sensitive data, mitigating risks, and ensuring the continuity of operations.

Furthermore, it is crucial to note that these measures align with the Nigeria Data Protection Act 2023, as the Act aims to protect the privacy rights of individuals and regulate the collection, storage, processing, and sharing of personal data. 

 


We’ve got the edge. Get real-time reports, breaking scoops, and exclusive angles delivered straight to your phone. Don’t settle for stale news. Join LEADERSHIP NEWS on WhatsApp for 24/7 updates →

Join Our WhatsApp Channel



Tags: Cyber Attacks
SendShareTweetShare
Previous Post

Dwindling LNG Prices Drown TotalEnergies Financial Returns

Next Post

Lafarge Africa Pioneers Green Mobility In Africa

Royal Ibeh

Royal Ibeh

You May Like

Wema Bank As Metaphor For Trust, Shareholder Value
Feature

Wema Bank As Metaphor For Trust, Shareholder Value

2025/05/13
How To Know If Your Car Service Centre Is Using Genuine Spare Parts
Feature

How To Know If Your Car Service Centre Is Using Genuine Spare Parts

2025/05/13
Meet Robert Prevost, Now Pope Leo XIV, First American Catholic Pontiff
Feature

Meet Robert Prevost, Now Pope Leo XIV, First American Catholic Pontiff

2025/05/08
OBAZEE REPORT…CBN Wields Big Stick, Sacks Banks’ Boards
Business

From Brink To Beacon: CBN Signals New Dawn With Financial Performance

2025/05/07
A Visionary Governor, A President Of Action: Katsina’s Story Of Progress
Feature

A Visionary Governor, A President Of Action: Katsina’s Story Of Progress

2025/05/06
Leveraging Celebrity Photography For Huge Income
Feature

Leveraging Celebrity Photography For Huge Income

2025/05/03
Leadership Conference advertisement

LATEST

ASUU Threatens To Sue JAMB Over UTME Mass Failure

Akpabio Harps On Importance Of Census For National Planning

Final Year Student Of Michael Okpara Varsity Slumps, Dies

Police Confirm Arrest of 9 Suspected Killers Of PDP Chieftain In Adamawa

Bandits Kidnapped 200 In My Constituency, Says Zamfara Federal Rep

itel Solar Energy Opens First Customer Experience Centre In Lagos Market

NYCN Reconstitutes Key Leadership Structures

Cassie Ventura Gives Evidence In Sean Diddy’s Trial

Shadow Gov’t: DSS Drags Pat Utomi To Court, Accuses Him Of Usurping Tinubu’s Powers

JAMB Registrar Oloyede Breaks Down In Tears, Apologises Over 2025 UTME Errors

© 2025 Leadership Media Group - All Rights Reserved.

No Result
View All Result
  • Home
  • News
  • Politics
  • Business
  • Sport
  • Health
  • Entertainment
  • Opinion
    • Editorial
  • Columns
  • Football
  • Others
    • LeVogue Magazine
    • Conferences
    • National Economy
  • Contact Us

© 2025 Leadership Media Group - All Rights Reserved.