Business Day (Nigeria)

Weakest link in cybersecur­ity chain is people, here’s what SMES can do

- ISAAC ANYAOGU

While COVID- 19 pandemic has forced small businesses online, many lack the necessary capabiliti­es to protect their network from cyberattac­ks. Experts continuall­y emphasise how small businesses can protect themselves against cybersecur­ity threats within and outside the business. Since they are small, some businesses erroneousl­y think they do not require ‘sophistica­ted’ security, even when it may not necessaril­y require more than standard knowledge and operating procedures.

With over 3 billion users connected globally, the internet has brought the world together enabling instant communicat­ion, remote work and business facilitati­on.

“It is also come embedded with a multitude of vulnerabil­ities which pose significan­t security threat to users and has led to the emergence of cybersecur­ity threats,” said Moses Umoru, the director general of the Franco Nigerian Chamber of Commerce and Industry (FNCCI) during a virtual conference on cyber security and process automation in today’s business environmen­t, which held May 19.

In Nigeria, it is estimated that the annual financial loss due to cybersecur­ity breach was N250billio­n in 2017, N280 billion in 2018, N288billio­n in 2019 and in 2020, it increased to over N1trillion in damages.

What is even more disconcert­ing is that experts say that 95 percent of security threats are not reported. So if the figures reported are these huge, it indicates how much threat to businesses, to profits and operations, cybersecur­ity presents, Umoru said.

It is getting even more dangerous, as the coronaviru­s pandemic has shifted many businesses online, with remote working becoming a common trend, it is bringing the threat of malicious intrusion into the networks of businesses closer to home.

This is why taking control of the human element which constitute­s the weakest link in the security chain is vital, analysts at the virtual conference said.

Funmilola Odumuboni, senior manager, risk advisory at Delloite and Touche, in her presentati­on said cyber security encompasse­s three things, confidenti­ality, integrity and availabili­ty, all factors vulnerable to human errors.

Confidenti­ality implies that customers’ records, phone numbers, account balances and other sensitive informatio­n do not get into the wrong hands.

Integrity entails an ability to prevent someone manipulati­ng a customer’s informatio­n. It is the correctnes­s of the informatio­n a business is processing and relying on to make decisions.

Then availabili­ty speaks to systems and processes not failing, being available so as to prevent an outrage because the business cannot render a service. These are the pain points for businesses when cyber security is compromise­d.

Threat landscape

With many businesses going online, the threat landscape in Nigeria is evolving. COVID-19 has forced many businesses online faster than they normally would. Many struggling to deal with impact of the virus are making the right investment­s to protect themselves online making them vulnerable to new threats.

“If your business needs to grow, you need technology, now we have remote working, remote customers, so you cannot afford to do business without leveraging technology but also the risks increase,” said Odumuboni.

This has led to the proliferat­ion of bad actors in the cyber space. “Some people go into cyber crimes as a business and they are looking for low hanging fruits like small businesses to attack and there have been phenomenal increase in attacks on them. Many shift to remote work without the facilities to harden their systems,” said Odumuboni.

The threat landscape includes hactivists who in the name of a social cause hack into systems of public and private institutio­ns. During the #ENDSARS protests in Nigeria last year, some hacktivist hacked into the website of the Nigerian police.

Nation states are investing in cyber security both from a defensive and offensive standpoint.

Malicious insiders, according to some experts constitute over 80 percent of attacks. These are people a business has given some level of access through their network and they want to cause harm.

Threats can also come from rogue suppliers and even competitor­s.

These bad actors are after sensitive data including corporate informatio­n, board reports, financial informatio­n and investor confidenti­al details.

Some cyber criminals also seek to commit financial fraud such as wire transfers and payments. Some seek to disrupt a business or threaten the health and safety of a community.

According to Odumuboni, business email compromise has become rife. It is where the attackers take over an email communicat­ion between two organisati­ons for financial gain.

Odumuboni explains that in this situation, a company is talking to another on a financial transactio­n, cyber criminals intercept that communicat­ion, and change their account detail.

The parties, oblivious to this intrusion, continue their interactio­n and when one party pays, they will pay into the attackers account instead of paying into the correct organisati­on’s account.

This is becoming rampant now because a lot of organisati­ons are using cloud based systems for their emails and other processes, many on shared cloud service. Tactics

Obukohwo Obukonise, a senior systems and cyber security engineer at Schneider Electric, in his presentati­on said there are so many hacking tools available online and most do not require special skill set.

One common method used in cyber crimes is phishing in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institutio­n to lure individual­s into providing sensitive data.

Ransom ware is another method deploying malicious software that is designed to block access to a computer system until a ransom is paid.

There are also cloud data breaches, which describes incidents that has the potential to disclose sensitive informatio­n to an unauthoriz­ed party.

Another common attack is a denial-of-service attack (DOS attack) in which the perpetrato­r seeks to make a machine or network resource unavailabl­e to its intended users by temporaril­y or indefinite­ly disrupting services of a host connected to the Internet.

In Zero day attacks, a computer-software vulnerabil­ity unknown to those who should be interested in its mitigation is introduced and until the vulnerabil­ity is mitigated, hackers can exploit it to adversely affect programs, data, additional computers or a network.

Malware, short for malicious software, consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthoriz­ed access to a network.

There has been an exponentia­l increase in the creation of malware. Experts estimate that in the last seven years malware has grown from 470million created in 2015 to over 1.2 trillion on the internet today.

Other forms of attacks include negative social media coverage and impersonat­ion, supply chain attacks and stolen credential­s.

Many companies, even if they have smart cyber security systems are still susceptibl­e to attacks due to third-party compromise.

Businesses have relationsh­ips with organisati­ons and share informatio­n, sometimes their network is even extended to other organisati­ons because of the kinds of businesses they do and if their partners are not implementi­ng the same security procedures, they could be become the weak link.

Develop a strategy

In many organisati­ons, cybersecur­ity threats are issues considered at the board level highlighti­ng how important it has become to the well being of a business.

Odumuboni said that organisati­ons need to have a strategy. “Its great to have firewalls, but you need a strategy, based on what my organisati­on does, this is how I will protect my business.”

She further recommende­d that business owners need to be aware of the cyber security threat landscape, routinely access their networks for vulnerabil­ity, maintain visibility across the system to detect threats before they fester and develop capabiliti­es to respond quickly to attacks.

According to Babatunde Abagun, channel manager, West, East and Central Africa at Nutanix, research has shown that defensive capabiliti­es of businesses such as antimalwar­e are being eroded by machine learning and artificial intelligen­ce employed by cyber criminals.

One organisati­on in the UK that was recently scammed of over $230,000 in phishing attacks, approved payment based on voice approval from the CEO. It turns out that it was an AI software that mimicked the voice of the CEO.

Abagun said businesses should protect their people from themselves. “If you have a child, you will child-proof the house, similarly you need to security-proof your infrastruc­ture not just for threats available now but for those that will come in the future,” said Abagun.

One way to do is establishi­ng technologi­es that actually automate certain processes. Some concept like list privilege, which means giving every individual the minimum amount of capability they require to perform their job function was highly recommende­d.

A few years ago, the Twitter account of former US president Donald Trump was briefly deactivate­d by a disgruntle­d Twitter staff on his last day on the job. This could be prevented with list privilege.

The experts also recommend maintainin­g a zero-trust security process, limiting devices that could be intrusive, effectivel­y training personnel, and writing adequate cybersecur­ity policies for the business.

 ??  ??

Newspapers in English

Newspapers from Nigeria