By Chinenye Anuforo, [email protected]

The recent advances in cyber-threats as a result of the rising adoption of latest technologies by organizations in Nigeria prompts a call for upgrade of critical security infrastructure, says PPC Nigeria, a foremost ICT and infrastructure development company.

In response to a series of cybersecurity alerts issued by the Nigerian Communications Commission (NCC), the Head of the ICT Division at PPC Nigeria, Dr. Patrick Ede, while speaking in Lagos, said cyber-criminals were now using sophisticated tools to take control of outdated IT systems and gain remote access to important customer data.

The implication of this, according to him, is that organizations whose security has been breached will experience disruption of critical operations, loss of revenue and important data.

He stated that the credibility and reputational damage the activities of malicious cyber hackers cause were often irreversible, adding that neglect of vulnerabilities in IT systems would hamper overall business performance.

Related News

The NCC’s Computer Security Incident Response Team (CSIRT) issued different security alerts in the past months, urging Nigerians to be wary of five malicious Google Chrome Extensions, compromised apps and vulnerabilities in specific antivirus products that secretly track users’ activities online and compromise their data.

The telecoms regulator said the malwares, which have high damage potential, have been downloaded multiple times by unsuspecting people and consequently jeopardizing the privacy of users.

“Businesses are confronting new security threats arising from unprecedented global technology adoption and a hybrid work culture. These criminals explore the vulnerabilities in new and existing technology installations to launch their attacks,” Ede said.

He added, “It has become imperative for organizations to rethink how they address security concerns. Regular upgrade of software and hardware infrastructure should be included in cybersecurity measures to minimize risk of breaches.  Software is not perfect and loopholes are often exploited by threat actors. Therefore, businesses must plan to deploy patches immediately a security risk is announced by the vendor.

“While there has been a lot of focus on software updates, physical technology devices such as workstations and servers that are slow or have stopped receiving vendor updates, need to be replaced to mitigate risk of data breaches. Most end-of-life hardware infrastructure is not interoperable with new software installations and as such, the software requires an updated hardware to run it.”