THISDAY

Expert Links Cyber Security Breaches to AI, IoT Adoption

-

Worried about the increasing trends in cyber security breaches globally, where individual­s and organisati­ons with lots of data are hacked periodical­ly, the Founder of CWG Plc and Entreprene­ur in Residence at Columbia Business School (CBS), New York, Mr. Austin Okere, has attributed the trend to the fast adoption of evolving technologi­es among others.

Okere, listed the trends to include the adoption of Artificial Intelligen­ce (AI); Internet of Things (IoT), with over 25 billion devices forecasted to be connected by 2025. Others are globalisat­ion of cybercrime; cybersecur­ity skills gap; increased skill levels of attackers; increased use of the public cloud; increasing reliance on technology and digitisati­on, among others.

Okere, while presenting a paper on ‘Cybersecur­ity And Risk Mitigation’ at a recent webinar, explained that the results of the polls at a recent cyber-security webinar that he facilitate­d, revealed that 54 per cent of respondent­s had been hacked, 31 per cent said their company had been hacked, 67 per cent considered people the weakest link in cyber-security.

Okere, therefore called on organisati­ons to put in place, deliberate policies that will guide staff when connecting to enterprise servers through personal computers.

According to him, “Hiring the most accomplish­ed Certified Informatio­n Systems Auditor (CISA), however, will not do very much good if there is not a deliberate policy of self-awareness of all staff, especially during this period where there is an explosion in people working from home and connecting to enterprise servers through personal systems that could more easily be compromise­d.

“Neither is buying the most expensive antivirus the magic wand. It is like having the best pizza toppings without the base bread. Or like having the best machine leaning algorithm without the Big Data that the system will use for pattern detections.”

He listed the impact that cyberattac­ks could have on businesses to include: loss of funds, theft of intellectu­al property, serious disruption to business, damage to reputation, loss of customer trust, huge regulatory fines, litigation costs and possible bankruptcy.

“Risk mitigation against cybersecur­ity is most effective in its Dynamic Collaborat­ive Form. Dynamic because it requires a shared body of Knowledge that is consistent­ly updated and available to all parties.

“Risk mitigation cannot be a competitiv­e strategy for any organisati­on. This notion could be quite illusory because the nature of cybercrime can be likened to an elephant, where people at the side may think it is a wall, people at the trunk may think it is a snake. People at the tail may think in it is a monkey, and people at the leg may think it is a tree trunk,” Okere said, adding that as in the case of the elephant, it is only when you have curated the complete and accurate picture through which the breach can

Newspapers in English

Newspapers from Nigeria