Color LogoLoading...

🌍 Feed

✍🏿 Compose

The what and how of AI and Cybersecurity and its adoption in Africa.
Interpreting the jargon of Cybersecurity into relatable scenarios.  Mar 17, 2023
The what and how of AI and Cybersecurity and its adoption in Africa.


AI as we know performs tasks that are commonly associated with intelligence which by extension means that it has significant role to play in cybersecurity. Its capabilities can be leveraged to enhance the security of networks, systems, and applications as in and also not limited to social engineering and any suspicious cyber attack.

In this article we will be looking at ways AI can be used in Cybersecurity and the level of its adoption in Africa. Let’s get right to it.


AI can aid Cybersecurity in the following ways;

Threat Detection: AI can detect anomalies and patterns that can indicate a security threat, such as a cyberattack or unauthorized access. This is possible because it maintains data on user behavior and then uses pattern recognition to identify high-risk activities on the network and create effective signals in threat detection.  By analyzing vast amounts of data in real-time, AI can quickly identify security breaches and alert security teams as soon as it notices irregularities.


Malware Analysis: Malware is today one of the major threats faced by the digital world. Most modern malware types are complex, and many possess the ability to change code as well as the behavior in order to avoid detection. Instead of relying on traditional defense mechanisms, typically comprising the use of signature-based techniques, there is a need to have a broader spectrum of techniques to deal with the diverse nature of malware. AI can be used to analyze and identify malware, including unknown and zero-day threats, which are difficult for traditional antivirus software to detect. By using machine learning algorithms, AI can learn to identify new types of malware and take appropriate action to mitigate the threat.


Vulnerability Management: AI can help identify vulnerabilities in an organization's systems and applications, allowing for proactive measures to be taken to prevent attacks. This is because AI-powered solutions include threat and vulnerability management features that can scan and predict the risk across thousands of attack vectors and threats. AI can also prioritize vulnerabilities based on their severity, enabling security teams to focus on the most critical threats thereby making the work easier.


User Behavior Analysis: AI can be used to analyze user behavior and identify anomalies that could indicate a potential threat. By monitoring user activity, AI can detect abnormal behavior, such as attempts to access unauthorized resources or unusual login patterns.


Fraud Detection: AI can be used to detect fraudulent activities, such as phishing scams, and prevent financial losses. By analyzing user behavior and network traffic, AI can identify suspicious activity and alert security teams.

In all of the ways in which AI is used to aid cybersecurity, one thing is glaring and it's the fact that AI uses behavioral analysis mostly to detect anomalies. Even though AI can significantly enhance the capabilities of cybersecurity systems by detecting and responding to threats faster and more effectively than traditional methods it is important to note that AI is not a silver bullet, and human expertise is still necessary to interpret the data and make informed decisions. AI does not replace the need for human intelligence however it makes detection faster which can go a long way to aid the mitigation of risks.


Africa is not left behind in the adoption of AI in Cybersecurity as Africa is recording steady growth and increased innovation and entrepreneurship in the AI field.

There is growing interest and investment in AI in Africa, and several initiatives are underway to promote its adoption and development of which cybersecurity is not excluded.


Some AI driven Cybersecurity companies in Africa includes and not limited to;

1.  Augmenta Cyber Security

2.  Tactical Intelligence Security Ltd. ·

3.  Tabiri Analytics

4.  Zuoix

5.  Cyberspace Ltd.

6.  Cyber Talents

7.  Logiskay

While the adoption of AI in Africa is still in its early stages, there is a lot of potential for the technology to have a positive impact on our continent and address some cybersecurity challenges. AI has come to stay.

Top comments(0)

SEND

You may like this too...

Chioma Okeke

Cyberattacks put your money, data, and IT equipment at risk. If a hacker gains access to your network, they can inflict significant damage with what they find.


      It's important to protect your business from cyberattacks, but with the cyber landscape evolving all the time, it can be daunting to know where to start. Here’s a guide to help small businesses navigate the world of cyber threats.



1:Secure Your wifi-networks


Businesses can protect their Wi-Fi network from breaches by hackers by changing the name of their wireless access point or router, also known as the Service Set Identifier (SSID). They can use a complex Pre-shared Key (PSK) passphrase for additional security.


2:Guard against physical theft


While businesses need to be mindful of hackers trying to breach your network, they mustn't forget that  hardware can be stolen too. Unauthorized individuals should be prevented from gaining access to business devices such as laptops, PCs, scanners, and so on. This may include physically securing the device or adding a physical tracker to recover the device in case of loss or theft. Ensure all employees understand the importance of any data that might be stored on their cell phones or laptops when out and about.


3: Ensure third parties who deal with your Business are also secured.


Be wary of other businesses such as partners or suppliers who may be granted access to your systems. Make sure they are following similar practices to you. Don’t be afraid to check before you grant access to anybody.


4: Training Employees.


Invest in cyber security trainings for the employees,for instance they can be educated with the importance of strong password and how to spot phishing emails.And also educate  them on the different types of cyber attacks and how to avoid and navigate them.


5: Deploy Anti-virus software.


Choose softwares that can protect business devices from viruses.keep antivirus updated to avoid latest cyber threats.

Businesses can also employ the service of cyber security experts to help the business remain secured.


6:Back up business files regularly.


When you cyber attacks occur,files and data can be compromised or lost/deleted.But if the business has been current in backing up it's files and data it might avoid the end of the business due to loss of important files or data .

Also choose a program that gives you the ability to schedule or automate the backup progress.


7:Limit access to sensitive data.


Restrict the number  of people in a business  environment with access to critical data to a minimum.so as to avoid the impact of bad faith actors in the business.set up strategies that will help assign important task to individuals or groups that are identifiable and can be held responsible and accountable.


    Cyber threats aren't just a problem for big corporations and governments – small businesses can be targets too. In fact, there is evidence that small businesses are more vulnerable to cyberattacks, not least because they sometimes lack the resources to protect themselves effectively.



Jun 17, 2023

Josh Strong

Cryptocurrency adoption has continued to ride and thrive like a moving train, despite the hurdles that have stood in front of the industry. On a continent that was once believed to be an ancient relic of a primitive time, cryptocurrency has turned out to be of great interest to young Africans. In Nigeria, for instance, there are different perceptions of the industry. Some believe anything that has cryptocurrency in it is a scam, while others believe it is simply a get-rich-quick scheme. Thanks to various organizations and companies that have dedicated their time to organizing events to cure myopia among the African populace, we are getting a better idea of what the industry really is about. Before we get into the topic of the day, let's know what cryptocurrency wallets are.


What Are Cryptocurrency Wallets?


Cryptocurrency wallets are digital wallets used to store digital assets like Bitcoin and Ethereum securely. According to the Coinbase website, "crypto wallets keep your private keys—the passwords that give you access to your cryptocurrencies—safe and accessible, allowing you to send and receive cryptocurrencies like Bitcoin and Ethereum. They come in many forms, from hardware wallets like Ledger (which looks like a USB stick) to mobile apps like Coinbase Wallet, which makes using crypto as easy as shopping with a credit card online."


 Cryptocurrency wallets are not like traditional wallets. Unlike a physical wallet that can be stolen or lost, a crypto wallet is a digital asset that can be easily accessed by hackers if not secured properly. They are computer or mobile software programs that employ an internet connection to connect to the blockchain network of the cryptocurrency you're making use of. Cryptocurrencies aren't just kept anywhere. They are pieces of data saved in an organized database or ledger. These pieces of information are dispersed throughout the database; nevertheless, the wallet locates all the pieces connected to your public address and adds up the total for you via the app's UI.


Using these applications, sending and receiving cryptocurrency is incredibly simple. Several options are available for sending and receiving cryptocurrency from your wallet. The standard procedure is to enter the wallet address of the receiver, select an amount to transfer, sign the transaction using your private key, add funds to cover the transaction fee, and send it.


There are two types of wallets, custodial wallets and non-custodial wallets. Custodial wallets are hosted by a third party, which might be a company that offers high-level data security technologies used by companies to protect and safeguard their data. Some crypto exchanges offer these services to their customers. Non-custodial wallets are wallets where you are responsible for securing your keys. This is the type of wallet that most cryptocurrency wallets on devices use. There are also two categories of wallets: hot and cold. A hot wallet is one that has an internet connection, while a cold wallet does not.


Now that we have basic knowledge of what crypto wallets are, let's explore some of the best practices to keep your wallet safe.
 
1. Choose a Reputable Wallet Provider: The first step in securing your cryptocurrency wallet is to choose a reputable wallet provider. Do thorough research before selecting one, and find out which providers have a strong history of safe operations. Some popular wallet providers to consider include Trust Wallet, Ledger, Trezor, and MyEtherWallet, while you could also consider saving your funds with crypto exchanges like CoinW and Binance.
 
2. Use Two-Factor Authentication: Two-factor authentication adds an extra layer of security to your wallet. It requires you to enter a code generated by an app or sent to your phone before accessing your wallet. This can help protect your wallet against hacking attempts.
 
3. Keep Your Private Keys Safe: Your private key is like the password to your cryptocurrency wallet. If someone gets hold of it, they can easily access your funds. Never share or store your private key online. Instead, store it on an offline device like a hardware wallet or a paper wallet.
 
4. Use a Strong Password: A strong password should be complex and contain a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using easy-to-guess passwords like your name or birthdate. Change your password regularly and do not use it on any other online accounts.
 
5. Keep Your Wallet Software Up-To-Date: Keeping your wallet software up-to-date is important because it ensures that any security loopholes are fixed. Developers often release updates to address any vulnerabilities identified in the previous version.
 
6. Backup Your Wallet Regularly: If you lose access to your wallet or forget your password, a backup can save you. It is important to store backups of your wallet on other devices in case your primary device is damaged or lost.
 
7. Be Cautious of Phishing Scams: Phishing scams are common in the cryptocurrency space. Fraudsters often send fake emails and messages asking for your private keys or other sensitive information. Always verify the authenticity of any email or message before responding.
 
In conclusion, securing your cryptocurrency wallet requires a bit of effort, but it is worth it to protect your assets. By following the best practices outlined above, you can help keep your crypto wallet safe from hackers and other types of security breaches.

Jun 15, 2023

Chioma Okeke


        Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision.

            The technology handles tasks at a pace and scale that humans can't match. At the same time, by removing such tasks from human workers' responsibilities, AI allows those workers to move to higher-value tasks that technology can't do. 

          Businesses in Africa,can become  Leading AI experts and  expound on areas where artificial intelligence technologies can improve their business operations and services.

       These areas could includes the following and more;


1. AI Technology Enhances Productivity

When you reduce tasks from your employees’ to-do list, they are likely to focus on excellence in what they do.


With AI technology, you will not have to pile a lot of work for your employees to handle since AI will do the most work. This allows your workforce to do what they are best in, thus boosting productivity.


If your business involves constant communication with customers throughout the day, AI will offer real-time assistance. For example, in the travel industry, which has millions of thousands of passengers every day, AI can pass important travel information to passengers.


2. Enhancing Smart and accurate decision making


  In the modern economy, data is an invaluable resource in any business. However, if you cannot make any sense of it, your business data will be useless.


AI machines are efficient at quick data processing to generate relevant answers to any question arising in the business. They offer accurate predictions, and customers’ needs based on what they learn.


No human will be fast and yet perfect, as the AI technology in predictive analytics.


3. Improving Customer Experience

AI-driven chatbots allow businesses to provide customer care services 24/7. AI has enabled companies to automate communications through emails, online chats, and even telephone calls.


The good thing with AI is that they can interact with many customers simultaneously and respond to their questions effectively on websites or apps.


4.Reducing Errors

While artificial intelligence is not error-free, it is by far more accurate than human beings.


Mostly, the AI technology accuracy ranges from 99 to 100 percent, even for very urbane systems.


In any company, the most time-consuming process yet prone to human error is cash flow forecasting. AI technology can help in increasing accuracy in forecasting cash flow without manual interference. This gives the business a higher chance of achieving success.


Artificial intelligence is one of the most incredible techs that will transform lives in almost all facets of modern society.


This technology provides significant development opportunities that many businesses and companies have already been fast to grab.


      In conclusion,As businesses continue to deploy artificial intelligence technologies within their operations, they are starting to reap tangible benefits, including material gains.

        It is also pertinent to ensure that even as African businesses should want to adapt to the use of AI technologies,it is also important to carefully consider the potential ethical and social implications of AI and ensure that its development and deployment are done in a responsible manner.


May 8, 2023

Faith Atabo

Last month, I got a message from my friend and it states " Faith turn off your location on Twitter, you teach us  Cybersecurity but here you are making the same mistake " 🥴


Something as little as "turning off your location" when you post on your social media platforms can save you from potential threats


Turning off your location on your social media platform is a quick and easy step 


👉🏻 First, go to your profile page on your social media platform 

👉🏻click on settings

👉🏻select privacy and safty

👉🏻select location 

👉🏻select Disabled 


vula! you are all done. This procedure may varry from app to app, but it is really easy to navigate .

Go ahead and "turn off your location"


cheers!



Apr 11, 2023

Oluwadamilola Elizabeth


Artificial intelligence (AI) is one of the most promising and rapidly developing technologies of the 21st century. AI refers to the ability of machines to perform cognitive tasks that are typically associated with human intelligence, such as learning, problem-solving, and decision-making. As AI continues to evolve, it has the potential to transform numerous industries and revolutionize the way we live and work. So therefore, it is imperative that we look into how it is transforming Industries and it Ethics Consideration.


Applications and Impact of AI in the World today: 

  1. Healthcare: AI has the potential to improve the accuracy and efficiency of medical diagnosis and treatment. For example, AI-powered imaging systems can detect early signs of diseases and identify abnormal patterns in medical scans. AI algorithms can also help doctors personalize treatment plans based on individual patient data, improving patient outcomes.
  2. Transportation: AI is transforming the transportation industry by enabling autonomous vehicles, optimizing routes and reducing fuel consumption. Self-driving cars and trucks can increase safety and reduce traffic congestion, while predictive maintenance can reduce downtime and save costs.
  3. Manufacturing: AI can improve production processes, optimize supply chains, and predict demand. With AI, manufacturers can improve product quality, reduce waste, and increase efficiency.
  4. Finance: AI can enhance fraud detection, risk management, and customer service in the finance industry. For example, AI algorithms can detect fraudulent transactions and flag suspicious behavior in real-time, preventing financial losses.
  5. Retail: AI can personalize customer experiences and optimize inventory management. With AI, retailers can provide tailored recommendations to customers, anticipate demand, and reduce waste.

Challenges and Ethical Considerations:

While AI has the potential to transform various industries, it also poses several challenges and ethical considerations, including:

  1. Job Displacement: AI automation may lead to job displacement in certain industries, potentially exacerbating inequality and social unrest. 
  2. Bias: AI algorithms are only as good as the data they are trained on. If the data is biased, the algorithms will also be biased, perpetuating existing inequalities and discrimination.
  3. Data Privacy: AI algorithms rely on large amounts of data to learn and make decisions. However, the collection and use of personal data raises privacy concerns, and companies must ensure that they handle sensitive data responsibly and transparently.
  4. Regulation: As AI becomes more widespread, there is a need for regulation to ensure that it is developed and used responsibly and ethically.

In conclusion, AI is an emerging technology with the potential to transform various industries and revolutionize the way we live and work. However, it also poses several challenges and ethical considerations that must be addressed to ensure that it is developed and used responsibly and for the greater good.

Apr 10, 2023

Busola Popoola

Africa is a continent with diverse cultures, languages, and economies, and it has long struggled to provide adequate healthcare to its people. However, with the rise of artificial intelligence (AI), Africa has the opportunity to revolutionize access and quality of healthcare.


AI has the potential to transform healthcare in Africa in multiple ways. Firstly, AI-powered devices can provide more accurate diagnoses, allowing healthcare professionals to prescribe the right treatment and improve health outcomes. For example, AI can analyze medical images, detect abnormalities, and provide a diagnosis within minutes, which is especially crucial in rural areas with limited medical resources.


Secondly, AI can improve access to healthcare services by providing remote consultations and telemedicine. This is particularly important in Africa, where many people live in remote areas without easy access to medical facilities. With AI, patients can consult with healthcare professionals remotely, reducing the need for travel and increasing access to healthcare services.


Thirdly, AI can help healthcare professionals make better decisions about patient care. By analyzing large volumes of medical data, AI can identify patterns and insights that may not be visible to human doctors, leading to more informed decisions and better patient outcomes.


Moreover, AI-powered medical devices can help to increase the efficiency of healthcare delivery. For example, robots can assist in surgeries, freeing up healthcare professionals to focus on other aspects of patient care.


Finally, AI can help to reduce healthcare costs in Africa. By automating routine tasks and improving diagnostic accuracy, AI can help to streamline healthcare delivery and reduce the need for expensive medical interventions.


Overall, the potential of AI in revolutionizing access and quality of healthcare in Africa is enormous. However, it is important to ensure that AI is implemented ethically and with appropriate governance, to ensure that it benefits all Africans, regardless of their socioeconomic status. By embracing the potential of AI, Africa can ensure that all its citizens have access to high-quality healthcare services, regardless of where they live.


In conclusion, AI has the potential to revolutionize access and quality of healthcare in Africa. By providing accurate diagnoses, improving access to healthcare services, helping healthcare professionals make better decisions, increasing efficiency, and reducing costs, AI can transform healthcare delivery in Africa. However, it is crucial to ensure that AI is implemented ethically and with appropriate governance, to ensure that it benefits all Africans, especially those living in remote areas with limited medical resources. By embracing the potential of AI in healthcare, Africa can improve the health outcomes of its people and make progress towards achieving universal healthcare coverage.

Apr 5, 2023

Faith Atabo

As the popularity of Cryptocurrency increases - a new form of malware (malicious soft) has emerged called Cryptojacking.


What is Cryptocurrency? : They are digital currency (e.g. Bitcoin, Ethereum) that can be used in exchange for goods, services, and even real money. Cryptocurrency can be purchased or earned through “mining”.  


The term Mining, involves using a computer to solve complex, encrypted math equations in return for a piece of cryptocurrency.


What is Cryptojacking: Cryptojacking occurs when cybercriminals use a victim’s computer, tablet, or mobile device to mine for cryptocurrencies without their knowledge. Unlike most other types of malware, cryptojacking scripts do not normally cause damage to victims’ data.  However, Cryptojacking does slow down a victim’s computer and internet connection and can cause battery drain.



How Does Cryptojacking occurs?


  • Malicious Applications: Hackers trick victims into loading crypto-mining code onto their computers, through phishing-like tactics. Victims receive a legitimate-looking email that encourages them to click on a link that installs crypto mining software that runs in the background.
  • Malicious Websites (Drive-by cryptojacking): Victims visit a site that runs a malicious script or is hosting a malicious advertisement. The script can do one of two things:
    • If the website is open, the user’s computer can be used to actively “mine” for cryptocurrency. This "Drive-by" attack can compromise any device with a web browser.
    • The website can use a script to install a malicious application without your knowledge
  • Github: GitHub is a web-based platform for collaborative software development (software can use code shared on GitHub).  Some Hackers will take code that is shared and hide cryptojacking malware within a fork of the project.

How Can I  Prevent Cryptojacking Malware

  • Here are some helpful preventive measures 
    • Keep all your software and devices up-to-date with the latest patches and fixes. Many attacks exploit known vulnerabilities in existing software.
    • Only install software from trusted sources.
    • Avoid suspicious websites (e.g. torrentingshortened URLs) that can host these malicious scripts.

How Can I  Detect and Recover from Cryptojacking

  • Symptoms of cryptojacking can include unexpected high processor usage (indicated by sluggish or slow response times) overheating of your device, and poor battery performance
  • If you think you are victim of Cryptojacking close all of your browser windows to exit your browser, remove any browser extensions, and run an antivirus scan. If an NJIT owned PC, open the McAfee Endpoint Security application and select “Scan System”.   Otherwise, scan your computer using your installed virus protection.

Remember to always stay ALERT ‼️ 

Apr 3, 2023

Faith Atabo

For my cyb ethusisast, Here are 9 soft ware you can install for free!

1.For Operating System- Kali Linux 


2. Email Security -Deshashed 


3.Web Hacking -Burp suite


4.Port Scan-Nmap


5.Training -Hack the box


6.Data Mordification-Cyber chef


7.Intrusion Detection System-Snort


8.Firewall/Router-Pfsense


9.Debugging-Ghidra 

Mar 28, 2023

Samuel Justina


In recent years, the use of cryptocurrency in Africa has been growing rapidly, especially for remittances, this is because it offers a swift, convenient and direct peer-to-peer channel for remittance payments, international commerce and savings. Remittances refer to the money sent by migrants to their families and friends back in their home countries. 


According to a report by "Africa in Focus", remittance flow to low and middle-income countries reached $550B in 2019, surpassing foreign direct investment aid, they further added that Nigeria alone received half of the total remittance flows to sub-saharan Africa in 2019 which was valued at $48B. 


Moreso, a recent report by Chainalysis, as sited by 'Quick Takers', posits that between July, 2020 and June, 2021, Africans received $105.6B worth of cryptocurrency payments - an increase of 1200% compared to year, 2019.


Cryptocurrency has emerged as a cheaper,  faster and more secured way to send and receive remittances compared to traditional methods. This article will explore the impact of cryptocurrency on remittances in Africa, comparing traditional methods and blockchain-based solutions.


Traditional Remittance Methods in Africa


For many years, traditional remittance methods such as bank transfers, money transfer operators (MTOs), and cash-to-cash services have been the primary ways of sending and receiving remittances in Africa. These methods are often expensive and time-consuming, with high fees and lengthy transaction times. 


A report by 'Africa in Focus' stated that the high cost of remittance charge paid to these service providers is quite exorbitant to the tune of about 9% of the total money sent and it happens to be the highest rate in the world and thrice the Sustainable Development Goal's target for remittance cost of 3%. Likewise, the cost of international remittances within Africa is also high and higher than that from USA or Europe. 


Bank transfers are a popular option for remittances in Africa, but they are often expensive and slow. The sender may have to pay high fees for international transfers, and the recipient may have to wait several days to receive the funds.


MTOs such as Western Union and MoneyGram are also popular in Africa. These services allow people to send and receive money quickly, but they come with high fees. For example, Western Union's fees for sending money to Africa can range from 5% to 10% of the total amount sent.


Cash-to-cash services are also widely used in Africa. These services allow the sender to deposit cash at an agent location, and the recipient can pick up the cash at a different agent location. However, these services can be expensive, with fees ranging from 5% to 20% of the total amount sent.



Impact of Cryptocurrency on Remittances in Africa


Cryptocurrency has emerged as a cheaper and faster way to send and receive remittances in Africa. Blockchain-based solutions have the potential to disrupt the traditional remittance industry, making it more accessible, secured and affordable for people in Africa.


According to the Brookings Institutions, 2022 Foresight Africa report as recently sited by 'Quick Takes',  the importance of cryptocurrency in improving remittance payments cannot be over-emphasized, adding that while international remittance fees costs about 7% of the total money transferred, cryptocurrency remittance fees costs just a fraction of less than a U.S dollar and also occurs in seconds unlike the others (the likes of SWIFT) that takes 2-3 days



One of the main advantages of cryptocurrency is the low transaction fees. Cryptocurrency transactions can be conducted for a fraction of the cost of traditional remittance methods. For example, Bitcoin transactions can cost less than 1% of the total amount sent, compared to the high fees charged by MTOs and banks.


Another advantage of cryptocurrency is the fast transaction times. Cryptocurrency transactions can be processed within minutes, compared to the several days it can take for traditional methods. This is especially important for people who rely on remittances for their daily needs.


Furthermore, cryptocurrency can provide financial inclusion to people who are unbanked or underbanked. Many people in Africa and unofficial immigrants do not have access to traditional banking services, making it difficult for them to send and receive remittances. With cryptocurrency, all that is needed is a smartphone and an internet connection, making it accessible to a wider range of people.


Moreso, cryptocurrency remittance is secured and transparent, as all transactions remains on the public ledger while ensuring the security and anonymity of the entities involved. 


However, there are also challenges to the adoption of cryptocurrency in Africa. One of the main challenges is the lack of awareness and education about cryptocurrency. Many people in Africa are still unfamiliar with cryptocurrency and how it works. 


Additionally, the volatility of cryptocurrency prices can also be a barrier to adoption. However, the best cryptocurrency for sending remittances abroad is the stable coins, due to its less volatility, and Bitcoin among others due to less volatility and more liquidity. Lnk:5



In conclusion, cryptocurrency has the potential to transform the remittance industry in Africa, making it more affordable and accessible for people. Blockchain-based solutions can provide faster, cheaper and a more secured transactions compared to traditional methods. However, there are also challenges to the adoption of cryptocurrency, such as the lack of awareness and education. It is important for governments and other stakeholders to work towards educating people about cryptocurrency and its benefits to accelerate its adoption.

Mar 22, 2023

Faith Atabo

Here are 8 possible ways you can be inviting a cyberattack 


1. Invisible systemic risk

Businesses, Organizations and Individuals make decisions every day that negatively impact their security readiness: for example, refusing to shut down a server for proper patching or choosing to keep working on old hardware and software to save budget. These unreported decisions lead to a false sense of security and increase the likelihood and severity of an incident.


2. Cultural disconnect

Non- IT folks still see Cybersecurity as something that is “just there,” like air or water. This means it isn’t considered a part of business decisions


3. Throwing money at the problem

You can’t buy your way out — no matter what you spend, you won’t be perfectly protected against cyberattacks. By trying to stop every risky activity, you will likely damage your organization’s ability to function.


4. Security as “defender”

If security officers are treated as (and act as) defenders of the organization, it creates a culture of no. For example, they might block the release of a critical application due to security concerns without considering the business outcomes the application supports.


5. Broken accountability

Accountability should mean that a decision to accept risk is defensible to key stakeholders. If accountability means that someone will get fired if something goes wrong, no one will engage.


6. Poorly formed risk appetite statements

Organizations create generic high-level statements about their risk appetite that don’t support good decision making. Avoid promising to only engage in low-risk activities, as this can create invisible systemic risk


7. Unrealistic social expectations

When a headline-grabbing security incident happens, society just wants heads to roll. While this isn’t fair, it’s the result of decades of treating security as a black box. No one understands how it really works and as a result, when an incident does occur, the assumption is that someone must have made a mistake.

However, society is not going to change until organizations and IT departments start treating and talking about security differently.


8. Lack of transparency

Some boards and senior executives simply do not want to hear or acknowledge that security isn’t perfect. Board presentations are filled with good news about the progress that has been made in security, with little or no discussion about gaps and opportunities for improvement

Mar 21, 2023
Home
Business Hub
Market Hub
You
By signing up you agree to ourTerms|About us|Market Hub|Business Hub|Deals Hub