Strengthening digital defenses: Understanding cybersecurity in a connected world
Quick Read
In today's digital age, where smartphones, computers, and smart TVs dominate our lives and businesses increasingly rely on digital systems to operate, computer security—also known as cybersecurity, digital security, or information technology (IT) security—has become a cornerstone of modern life.
McVester Okoh
In today’s digital age, where smartphones, computers, and smart TVs dominate our lives and businesses increasingly rely on digital systems to operate, computer security—also known as cybersecurity, digital security, or information technology (IT) security—has become a cornerstone of modern life.
Computer security is a subfield of the broader discipline of information security, and it focuses on protecting computer systems, software, and networks from a wide range of threats. These threats include unauthorized access, data breaches, cyber theft, and attacks that can damage hardware, corrupt data, or disrupt the services we rely on daily—from banking and communications to health care and government services.
Why Cybersecurity Matters More Than Ever
The global reliance on internet-connected systems has grown exponentially, and Nigeria is no exception. From Lagos to Abuja and Port Harcourt, more citizens and businesses are going digital. This shift—while beneficial—also brings new vulnerabilities. The expansion of wireless networks, cloud computing, and the growing use of smart devices and the Internet of Things (IoT) has increased the surface area exposed to cyber threats.
Cybersecurity is not just about protecting sensitive information. It’s about safeguarding the essential systems that keep our modern world functioning. This includes electrical grids, election infrastructures, financial networks, and even healthcare systems—all of which, if compromised, can have dire consequences.
Physical vs. Digital Security
While cybersecurity largely focuses on digital measures like strong passwords, encryption, and firewalls, physical security is also a vital part of the equation. For instance, access to computer servers and hardware must still be protected by locks, surveillance, and restricted access. Many breaches occur not because of poor software, but due to lax physical oversight.
It’s important to note that IT security, while closely related to information security, does not fully overlap with it. Information security includes not only digital data, but also paper records, human error, and broader organizational risks.
Vulnerabilities and Threat Actors
In cybersecurity terms, a vulnerability refers to a flaw or weakness in a system’s design, code, or configuration that can be exploited by a malicious actor. These vulnerabilities can lead to loss of data, service disruption, or unauthorized access. A globally recognized database, the Common Vulnerabilities and Exposures (CVE), catalogues thousands of these flaws for tracking and response.
Cybercriminals, often referred to as threat actors, constantly search for these weak points. Using automated tools or custom-made scripts, they can break into systems, steal data, and deploy malicious software.
Who Is at Risk?
Everyone—from large corporations to individual users—is vulnerable to cyber threats. However, the types and intensity of attacks often vary based on the target’s size and resources.
A 2023 report by the United Kingdom’s Department for Science, Innovation & Technology examined over 4,000 businesses, charities, and schools. Findings showed that:
● 32% of businesses experienced a cyber breach in the last year.
● Larger organisations reported higher rates: 59% for medium businesses, 69% for large enterprises, and 56% for high-income charities.
While larger organizations are prime targets, small and midsize businesses (SMBs)—such as many found across Nigerian cities and towns—are becoming increasingly vulnerable. Unlike large companies, SMBs often lack the advanced tools and trained personnel needed to defend against modern cyberattacks.
These businesses are particularly susceptible to:
● Phishing scams (fraudulent emails or messages)
● Ransomware (malicious software that locks data until a ransom is paid)
● Man-in-the-middle attacks (where hackers intercept communications)
● Malware (software designed to damage or gain unauthorized access)
● Denial-of-service (DoS) attacks, which shut down services by overwhelming them with traffic.
Everyday Internet Users Aren’t Safe Either
You don’t have to be a business to be targeted. In fact, ordinary Nigerians using the internet daily are some of the most vulnerable, especially to untargeted cyberattacks. These are broad attacks that scan the internet for weak points and affect thousands or millions of users.
Common forms of untargeted attacks include:
● Phishing emails impersonating banks or government agencies
● Ransomware disguised as legitimate downloads
● Watering hole attacks (infecting websites frequently visited by a target group)
● Port scanning for vulnerable devices
Because Nigeria is experiencing rapid digital adoption, awareness and education about these risks are urgently needed.
Common Cyber Threats to Understand
To protect your systems—whether personal or business—it is essential to understand common types of cyber threats. These include:
● Backdoors: Secret methods of bypassing normal authentication, sometimes installed by attackers to gain permanent access.
● DDoS Attacks: Flooding a system with traffic to knock it offline.
● Malware: Including viruses, worms, trojans, spyware, and ransomware.
● Phishing & Social Engineering: Tricking users into giving up credentials.
● Man-in-the-middle Attacks: Intercepting communication between two systems.
● SQL Injection: Attacking a database by inserting malicious code.
● Zero-Day Exploits: Attacks on vulnerabilities before developers can fix them.
● Brute Force & Credential Stuffing: Repeatedly trying passwords to gain access.
The Way Forward for Nigeria
As Nigeria’s digital economy grows—with initiatives like the National Digital Economy Policy and Strategy (NDEPS)—cybersecurity must be prioritized at all levels. Schools, hospitals, SMEs, local government offices, and even churches are not exempt from cyber threats.
We must:
● Educate citizens and staff about cyber hygiene.
● Implement cybersecurity frameworks at organizational levels.
● Invest in local cybersecurity talent and innovation.
● Adopt multi-factor authentication and regular software updates.
Just as we lock our doors to protect our homes, we must secure our digital frontiers to protect our data, privacy, and national infrastructure.
McVester Okoh is an AI/SOC Analyst with Vic Digital Tech Ltd, and also a youth mentor in Digital Tech.
Comments