Technology
Phillips Consulting’s Guide to Avoiding Security Complexities
Many years ago, the firewall was everything. Defence-in depth was a concept defined as layered defence with multiple firewalls on the path.
Behind the firewall was a fortress. Organisations designed networks with strong perimeters and demilitarised zones to ensure the crown jewels were well-protected. Attackers had a difficult time trying to break into the firewalls.
On the physical layer, Network Admission Control (NAC) technologies were implemented to prevent intruders from having direct access into the network by preventing them from plugging unauthorised devices into the network. Before a device was admitted, it had to meet a minimum requirement defined by the organisation.
Those years are gone and maybe gone forever. Cloud computing, Bring Your Own Device (BYOD), Artificial Intelligence, Internet of Things (IoT), VPNs and Remote Working Capabilities have dramatically changed the way businesses run.
These technologies have introduced a level of innovation and disruption that were unimaginable only a few years ago. They have resulted in the collapse of the traditional network perimeter, thereby increasing the attack surface for cyber-attacks.
Enterprise networks coverage is today being extended beyond our imagination – outside the traditional datacentres to smartphones, cloud platforms, mobile computers and IoT interfaces without geographical boundaries.
The bad guys now have a plethora of interfaces to launch their attacks on; they do not have to breach the network using traditional social engineering tactics physically.
The recent changes in the work environment occasioned by the COVID-19 have further amplified the extension of network boundaries beyond the traditional datacentres.
Employees work from home with devices and connections into the enterprise networks that were not originally designed for such. Improvised connections were made to allow functionality because the pandemic came without an announcement.
The danger this poses is that some of these end devices were not originally designed with security in mind. Even if security was a consideration, not so much for enterprise data protection. These devices are most of the time not hardened, and their owners may not understand the effects on the overall organisational security posture.
A handful of these devices are installed with default passwords, and most times, these passwords are not changed during or after installation. So, it is easy to guess the password by manual methods or using advanced dictionary or brute force attack methods.
Another risk posed by these endpoints is the lack of security updates and patches. Because they are sometimes not seen to be part of the enterprise network, they are not included in the patch management programme, and their presence introduces high-level vulnerabilities within the enterprise network.
It then becomes easier to utilise malware that could tunnel through the firewall to breach the enterprise network, instead of spending months and years trying to break into the firewall or layers of firewalls.
In recent years, large-scale attacks have been launched using malware by exploiting known vulnerabilities and security gaps on endpoints.
For example, the WannaCry, Petya and another variant of Petya, the NotPetya were employed to launch attacks on enterprise networks through vulnerable endpoints. Another danger with this trend is potential data leakage because these devices are used to either temporarily or permanently store organisational data.
There is also concern about device loss. If these devices are lost, there is a risk of exposing the organisation’s data to unauthorised entities, and that could both result in financial and reputational damage.
These dangers are also expanded by the impact of the COVID 19 pandemic, where organisations made ad-hoc improvisions to support businesses while employees work from home.
As commerce resumes, organisations are beginning to discover some capabilities to support their businesses remotely, and they are also rethinking their business continuity strategies.
For some businesses, this is not just a temporal shift, but a change which has permanently altered the operational procedures of the organisation.
Legacy cybersecurity strategies, techniques and investments will not be enough to mitigate the rising cybersecurity concerns introduced by this new way of working. Protection has gone beyond throwing in uncoordinated technical solutions and efforts.
Organisations need to rethink a new approach for the protection of their assets within the ever-growing complexity both to remain afloat and also to derive commensurate Returns On Security Investments (ROSI). A well-crafted strategy will ensure that cybersecurity efforts are coordinated within the enterprise, without duplication of efforts and resources, which will, in turn, drive down the cost of implementing cybersecurity initiatives.
To improve security posture, organisations must do the following:
- Continuously monitor the devices, applications, and processes running on the network.
- Automate security monitoring and mitigation.
- Implement systems that are capable of automatic detection, isolation and containment of threats within the network.
- Ensure that monitoring covers event data, session data, and historical data on endpoint usages, such as past processes, network connections, and other information.
Another measure organisations should take is reducing complexities. The extension of the network boundaries has not stopped organisations from using existing network solutions to protect the enterprise network.
However, in a bid to ensure the protection of the on-premise infrastructure and the ones beyond the organisational traditional network boundaries, organisations combine existing technologies with new solutions and the resultant effect is an increase in complexity.
To effectively manage security, organisations should put measures in place to ensure a reduction in complexity and enhancing visibility. This can be achieved by unifying all efforts and technologies for managing both on-premise and off-premise infrastructure in a single platform. Beyond technical controls, organisations should develop procedures, standards, and policies for acceptable use of organisational resources.
Technology
OPay, Coinbase, Others Crash as Cloudflare Suffers Another Glitch
By Adedapo Adesanya
Cloudflare Incorporated, a business providing cloud-based services to various enterprises, said in a note on Friday it is investigating issues with its Dashboard and related Application Programming Interfaces (APIs).
Numerous companies and services, including payments platform like OPay as well as Canva, Coinbase Global Incorporated, Investing.com , Shopify Incorporated, and Zoom Video Communications Incorporated, all appeared to crash, with some seeing “500 internal server error” and “Please check your internet connection and try again”.
The global outage has left many users unable to access these key services as this disruption has not only affected individuals but also businesses relying on these platforms for their operations.
Customers using the Dashboard or Cloudflare APIs are impacted as requests might fail and errors may be displayed, the company said on its status page.
In its latest update, Cloudflare added that “a fix has been implemented,” with the firm monitoring the results.
Users from all over the world have taken to social media platform X (formerly Twitter) to voice their frustrations over the issue.
This is Cloudflare’s second major disruption in nearly a month, following another incident in November that affected services like Spotify and ChatGPT.
At the last outage, Cloudflare’s services were largely restored within three hours, and fully restored after approximately five hours.
Technology
Google Unveils AI Skilling Blueprint for Africa
By Modupe Gbadeyanka
As part of broader Africa-focused Artificial Intelligence (AI) initiatives, Google has launched the AI Skilling Blueprint for Africa, designed to help governments build a future-proof workforce.
The programme provides governments with a comprehensive, step-by-step guide to formulate national skilling strategies. It focuses on developing three critical cohorts: AI Learners, who will gain foundational AI literacy; AI Implementers, professionals upskilled to integrate AI tools into their work; and AI Innovators, deep technical experts dedicated to building the next generation of AI solutions.
Africa is home to the world’s youngest and fastest-growing population. The continent shows immense potential for AI-driven economic growth.
However, new research highlights a significant challenge: while optimism for AI is exceptionally high, reaching 95 per cent in Nigeria and 76 per cent in South Africa, 55 per cent of firms across the continent report needing AI talent more than financing. Closing this skills gap is key to unlocking Africa’s opportunity.
Google’s Vice President of Government Affairs and Public Policy, Doron Avni, explained that, “The AI Skilling Blueprint provides a clear roadmap for governments to build the workforce of the future.
“By also investing in AI-ready data and expert local organisations and partners, we are helping build the interconnected ecosystem needed for a prosperous, AI-driven future for the continent.”
As part of its broader initiatives, Google also announced $2.25 million to support projects building trustworthy public data sets for AI by the UN Economic Commission for Africa (UNECA), the UN Department of Economic and Social Affairs (UN DESA) and PARIS21.
This contribution will help national statistical offices modernize their infrastructure and empower decision-makers with the reliable data they need to address challenges from food security to economic growth.
“For Africa to drive sustainable development, evidence-based policymaking is indispensable. This requires accessible, reliable, and AI-ready data.
“This effort is a crucial step forward. By building a Regional Data Commons, we can empower African institutions with the data and tools they need to make strategic choices that will drive growth and prosperity,” the Executive Secretary of the UN Economic Commission for Africa, Claver Gatete, said.
Finally, building on its $7.5 million Google.org Skilling Fund commitment, Google announced the first set of expert social impact organizations who will receive funding to execute on projects consistent with its skilling mission, including FATE Foundation and the African Institute for Mathematical Sciences (AIMS), which will embed advanced AI curricula into universities; and JA Africa and CyberSafe Foundation, which will advance crucial work in online safety and digital literacy.
“We are incredibly proud to partner with the African Institute of Management Sciences on the Advanced AI UpSkilling Project, with support from Google.org. This groundbreaking initiative is a direct response to the urgent need for deep AI competencies in Africa, empowering tertiary institutions, lecturers, and students in Nigeria, Ghana, Kenya, and South Africa.
“This strategic support aligns perfectly with FATE Foundation’s mission to foster innovation and sustainable economic growth across the continent, ensuring Africa is fully equipped to lead in the global technological future,” the Executive Director for FATE Foundation, Adenike Adeyemi, stated.
“We live in an age defined by rapid technological change and our mission at JA Africa is to ensure that African youth are not left behind. However, even as we engage our youth in more digital programs and encourage AI literacy, we are fully aware of the harmful effects of unchecked online exposure and, therefore, invest equally in protecting their data, physical safety and mental wellbeing.
“Through this support from Google.org, we will give young people the tools, knowledge, and confidence they need to navigate the digital world safely and responsibly,” the chief executive of Junior Achievement Africa, Simi Nwogugu, remarked.
Technology
Zoho Updates All-in-One Business Software Platform Zoho One
By Modupe Gbadeyanka
Global technology firm, Zoho, has enhanced its all-in-one business software platform known as Zoho One with improve security, and deeper intelligence across all over 50 applications.
The company improved the user interface, placing context at the centre of the user journey and removes traditional boundaries between applications.
Spaces now organise tools by purpose—such as Personal, Organisation, and Department-specific groups—enabling employees to access what they need without switching between apps. A centralised search bar spans the entire ecosystem, allowing users to find information or trigger workflows instantly.
An enhanced Action Panel provides a full view of upcoming meetings, unread messages, pending tasks, and other key updates, helping employees remain informed regardless of which app they are using.
The updated Dashboard consolidates data from Zoho and third-party apps into one central hub that can be customised using pre-existing or bespoke widgets.
The platform also introduced Vani, a new visual-first collaboration space that supports brainstorming, planning, and creation through diagrams, whiteboards, mind maps, and integrated video calling.
A central integrations panel enables administrators to monitor and configure all connections. Foundational integrations bring application-specific portals—Zoho or third-party—into a single unified portal. Practical tasks such as domain verification and authentication can now be configured more easily.
The new Smart Offboarding feature introduces outcome-based integrations, allowing organisations to transfer department ownership, manage employee device data, and determine data access rights within a single workflow, ensuring smooth transitions.
Also, Zia, Zoho’s AI assistant, is now accessible throughout Zoho One, providing unified intelligence that supports decision-making and improves productivity. Zia can aggregate and contextualise information from various platforms, including third-party systems such as Google Workspace, and present it as clear, actionable insight.
Zia Hubs, the platform’s intelligent content management system, now has a dedicated space where contracts, meeting recordings, and other important assets are automatically organised. Through Zia Search, employees can quickly surface relevant information without navigating multiple locations.
In addition, Ask Zia, available from the bottom toolbar, enables prompt-based searches across Zoho One, providing quick visibility into schedules, tasks, recent interactions, and other key details.
Commenting on the changes, the Country Head for Zoho Nigeria, Mr Kehinde Ogundare, said, “The Zoho One update reflects how work has evolved from using individual applications to operating within a unified platform.
“Zoho One customers are not simply licensing apps; they are choosing a solution that allows Zoho to handle the technology while they focus on productivity. The enhancements announced today deliver a cohesive experience built on unified integrations, context, and data.”
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism9 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking7 years agoSort Codes of GTBank Branches in Nigeria
-
Economy2 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn












