Skip to main content

Posts

The Importance of "Human Firewalls"

In computer networking and cybersecurity, a firewall is a security system that typically establishes a barrier between a trusted network and an untrusted network, such as the Internet, thereby preventing unwanted malicious traffic. It allows or blocks traffic based on a defined set of security rules, and it is usually the first line of defence. In today’s cyberspace characterised by advancements in Artificial Intelligence and increasing cyber threats, humans have become an important component in the security equation and not just the technologies — the firewalls! The concept of a "Human Firewall" Human firewalls simply refer to individuals or employees of an organization who have relevant knowledge and consciousness regarding cyber safety and are consistently building the culture of cybersecurity in both work and personal digital life. These are people within an organisation who follow cyber security best practices and report any data breaches or suspicious online activity th...
Recent posts

When “Backups” Becomes Target of Cyber Attacks

Maintaining reliable and secure backups of data and systems is one of the most important functions of any organisational IT team, which also forms a critical component of an organisational IT disaster recovery and business continuity plan. Having reliable backups helps to ensure that a business can quickly recover and continue to operate in the event of any sort of disaster such as failure of active systems, cyber attack, human error or even natural disasters. On an individual level, people make effort to backup their personal data in case of loss of a device and to be able to regain access to their important personal data. This is achieved by simply restoring data from backups on a new device which is usually a seamless process and gets the user up and running, eliminating the pain of loosing important data. The question is what happens when these valuable “backup vaults” become the target for cybercriminals? Why do cybercriminals target backup systems/data, how can organisations and ...

Cybersecurity “Vishing” Attacks — All You Need to Know

The spate of cyber attacks has significantly remained on the increase, and there are no signs of it slowing down — not with the continued reliance of individuals, small businesses, educational institutions, and of course governments around the world on Cyberspace. This reliance has made cyberspace to generate a vast and unending pool of sensitive data and information which are of very high value, hence making it a gold mine and prime target for cyber criminals to exploit. If we examine this from the perspective of information technology versus the humans who generate, process and store/transmit the information, we can try to determine which aspect is the most vulnerable to the tactics and techniques of the cyber “Bad Actors’’. Over time it has been determined that the weak-link in the chain is the “end-user” side. To a considerable extent, the Information Technology security side has matured over the years and is constantly being developed. Several reports have attributed a very high p...

The Importance of Cybersecurity Health Check for Small Businesses

   According to the International Labor Organization (ILO), small businesses have become the engine of economic growth and social development across all countries, accounting for a staggering 70% of employment worldwide . Obviously, these small businesses rely heavily on the internet and other online platforms and resources, which form integral components and enabling tools for their transactions. This has become even more prevalent since the pandemic period. Regarding online safety, it is estimated that over 40% of these small businesses have experienced a cyber attack. The type of cyber attacks that are more commonly aimed at small businesses include Social Engineering attacks like Email Phishing and telephone phishing otherwise known as "vishing"  There are a few factors that make small businesses to be vulnerable to attacks. Cyber criminals assume that small businesses have weaker security measures in places, ...

The First Cloud Datacenter Launches in Africa - January 2022

It was a remarkable day for the future of cloud technology in Africa as Oracle launched the first cloud region (Cloud Data center) on African soil - In Johannesburg South Africa. This means users of cloud services especially within Africa can now be able to choose a location closer to them for hosting of their cloud resources and applications. Also regulatory requirements would be met such as the Nigeria Data Protection Regulation (NDPR). What is a cloud region/Data center? It is the actual, real-life geographic location where your public cloud resources are located, where your data resides physically. Some think of the cloud to be a hypothetical or intangible storage in the sky, but it is indeed a physical robust IT infrastructure consisting of server machines and high-speed network connectivity designed to provide secured access to a large number of users or subscribers. Currently, Oracle has about 39 cloud regions around the world. Google boasts of 29 regions, Amazon AWS 26 regions,...

What Caused Global Downtime of Facebook, WhatsApp and Instagram

The World's most popular Social Media platforms - Facebook, WhatsApp, Instagram and Facebook Messenger went down for over 6 hours on October 4th 2021. These super Social Media platforms are owned by one company - Facebook and run on same infrastructure. Reports has it that this 6 hour long outage saw $7 billion wiped from Mark Zuckerberg’s net worth as users flocked to alternative platforms. Image Source: https://see.news/users-report-issues-with-facebook-instagram-whats-app/ I observed the downtime here in Nigeria from around 16:55 GMT+1 when I could neither send or receive messages on WhatApp. Also I observed my Facebook news feed was not getting refreshed with new content. At first I thought the problem was with my mobile telecom data service, but realized I could access other websites on the internet. On making further checks online I saw a report from an online real-time outage monitoring website DownDetector that Facebook was down! There were numerous reports as well that th...

Nigeria Central Bank Set To Launch Digital Naira Currency (eNaira)

The Nigeria Apex bank - the Central Bank of Nigeria (CBN) has announced plans to launch a digital currency called eNaira or Central Bank Digital Currency (CBDC) by October 1, 2021. The digital currency will be operated on the Hyperledger Fabric Blockchain which is an open source project that serves as a foundation for developing blockchain-based products, solutions and applications. It uses plug-and-play components that are aimed for use within private enterprises. Is CBDC similar to popular Cyrptos Such as Bitcoin? The answer is no, they are different in many ways: CBN can approve or override CBDC transactions since it is in control of the infrastructure, it a direct liability of the central bank and serves as the issuing authority. In contrast, crypto is private money with no central authority. The CBDC will be backed by law to become a legal tender, whereas the cryptos are not legal tender. Unlike cryptos that operate via blockchain networks in a decentralized way, a CBDC is a state...