Feature/OPED
Ericsson: Smart Home Privacy: How to Avoid ‘Data Paparazzi’
The paparazzi are known for often taking covert photographs of celebrities and selling them to tabloids or gossip magazines.
In a similar vein, could the increasing number of smart, connected devices coming into our lives start acting like covert “data paparazzi”? And what can we do to avoid it? Find out here.
Today, our devices collect and forward information to all sorts of external parties: our home security alarm provider, our electricity supplier, our fitness watch vendor, our car manufacturer, our security needs to be good enough that it deters attackers and so on. Smart assistants listen to our voice commands and take that information to the internet to execute our orders.
But smart devices go beyond the obvious too – they can be anything from a connected toaster to a washing machine, sewing machine, or a toothbrush!
Data from one device may not be a problem, but combining data from several devices could create a pattern that may reveal unwanted information about a user or a business. And with more devices coming into homes, concerns around the way personal data is managed, controlled and used by devices and organizations are increasingly being raised.
Each new device may introduce a new security risk, if not properly managed through its life cycle. The security risks must be handled by all actors in the value chain, including the device owner, regardless if devices are used by consumers, industries, or smart cities.
So what will be important to think about to ensure that users benefit and get value from devices and their related services, but avoid adding security issues? Should we risk unintentionally becoming surrounded by data paparazzi with their viewfinder aimed at us?
In this blog post, we’ll bring some light on to what these factors mean for the device owner and what can be done to confront it.
Smart devices and privacy: the big picture
Many of us already interact with at least 3 to 5 devices daily – a smartphone or even two, a smart watch, a tablet PC, a work laptop, and maybe a smart TV. One estimate is that by 2030, each of us will own 15 connected devices. Some devices, like a connected car or smart meter, are connected by default and typically managed by the company the user is a customer of. They typically rely on cellular connectivity. For many other devices, the users themselves select and provide the connectivity, often Wi-Fi or cellular, and are personally responsible for the management of the devices.
Above all, the network infrastructure and devices need to be secure. It’s important for us all that we can trust how our devices operate and handle data. It will also be important to ensure device security through the life cycle of the devices. With the fast growth and wide of range of smart and connected devices from different brands – that come with different user interfaces and functions – it might be cumbersome to keep all devices up to date in terms of firmware and security status, for example, from the day the device is purchased until its recycled. However, this is a key requirement for enabling a secure and trustworthy IoT environment.
GDPR and similar efforts have raised more attention to privacy from the general public. As people become more informed and want to know how their devices and information are used and managed, there will be an increased need for tools that enable identifying, verifying, and controlling the data the devices are collecting and sharing.
The data paparazzi problem
Let’s now go into some issues that celebrities have to deal with, regarding paparazzi and stalkers, and how similar situations can also occur in the IoT world. We’ll also reveal if similar mitigation strategies can work for both regular, and data paparazzi.
Information availability
While the saying goes that “all publicity is good publicity”, many celebrities wouldn’t agree. They want to be in control of the information shared about them, to build a relevant public image but avoid revealing private relations, unattractive personal habits, or similar.
The same thinking is behind IoT security; information that’s needed to complete the intended tasks of an IoT device should be made available, while the rest of the information should be kept private. However, for IoT there’s often a more fine-grained approach as the information made available should in many cases only be made available to a restricted group of observers on a need-to-know basis.
The stalker problem
Many celebrities might also have to deal with stalkers – individuals who are overly interested in them and may try to gain as much information about them as possible, even using illegal means.
In the IoT space, the same phenomenon could happen to the average Joe. A smart home that doesn’t restrict access to the information it generates can easily become a lucrative target for an attacker; the information generated by the home can be used to gather different information about the inhabitants, which could later be leveraged to commit a cyber attack. Information about when various appliances are used, such as when doors are opened, lights are switched on/off, energy consumption fluctuates, can be a real treasure trove. This also means that potential attackers might not skip a house just because there’s some security applied, rather the security needs to be good enough that it deters attackers from trying, or stops them in their tracks.
Mitigation strategies
Celebrities tend to take precautions to hinder paparazzi and stalkers from invading their privacy. This can be in the form of living in gated communities or at least having access control to their property, through walls and gates for example. They might also apply surveillance measures such as motion sensors and surveillance cameras, and even security measures such as guards or guard dogs. When moving about in public, they might have a security guard with them to keep interested parties at least at arm’s length.
The same things need to be considered in the IoT world. For example, in smart homes, access to the internal network and the data generated and stored there should be controlled and protected, monitoring should be applied to pick up on suspicious behaviour, and reactive security measures, such as blocking and logging, should be taken when a breach is detected.
What has been normal for celebrities should now also become the standard for anyone in an IoT environment. When it comes to privacy, active measures should be taken to maintain it. While this might sound scary – and without proper actions, it would be – it’s not something that’s difficult to achieve. Rather it’s about having the right mindset and recognizing that security needs to be built in and considered more and more in the connected world, even for private citizens.
What to protect?
IoT is very much about the data generated and consumed by IoT devices. At first, this data may be seen as producing no risk, but even simple data in a certain context may be sensitive. For example:
- Power consumption data recorded by a smart meter can provide a lot of information about what’s happening in a home. For example, based on the power consumption profile of TVs, switching on the TV will be visible from the data and if it’s possible to match the time the TV is turned on with the TV guide, that will provide a good indication as to what people at home are watching.
- Any competent smart lock manufacturer will make sure that the communication with the lock is encrypted and its integrity protected. However, this might not be enough; by observing the traffic generated by a smart lock, one could potentially deduce whether the lock has been opened from the inside or the outside and thereby predict if there’s anyone in the house at any given moment. Other data generated by a smart home, including power consumption and light switch data, can be used to improve the prediction.
- It’s inevitable that, at some point, an electric device will reach the end of its lifetime and will need to be disposed of. If the information stored on the device isn’t properly removed, a hacker who retrieves the device from a waste bin or who purchases it from a second-hand store could dig out data or credentials, as well as information about the services the device has been connected to. This is information that could be used to spy on the owner in a more efficient way, or even control or modify other devices belonging to the owner from the backend.
The question, therefore, shouldn’t be, “what do I need to protect?”, rather, “what don’t I need to protect?”, meaning “what do I actually need to share?”.
How to avoid unauthorized use of private data
There’s no silver bullet solution to this problem and the complexity is proportional to the number of devices and services that we as individuals interact with. Applying the best security practices is the responsibility of many entities. Device manufacturers and service providers need to provide secure devices/services, with proper control and maintenance for future proof device security.
But there are some rules of thumb that each of us can follow to minimize security and privacy issues related to our devices. By following these recommendations, one can build a system that will withstand a great deal of malicious intent, and deter the vast majority of attackers and opportunists. A few highly skilled and well-connected groups or individuals might be able to get past even the most secure systems, often through social engineering and phishing, that is, human weakness, rather than by technical security exploits. However, with the effort required, “average Joe” is maybe not the typical target.
End-user responsibilities include selecting suitable and secure solutions, and installing and configuring them in a secure way. Well-designed products should make this a relatively easy task, but it can also be done with the help of professionals. Furthermore, there are initiatives such as the Finnish Cybersecurity Label providing security labels for IoT devices, which aim to help consumers select products for which security has been verified.
Another important thing is to remember to update the software of the device.
And based on statistics regarding how a system’s security most often fails, a crucial task for the end-user is to remember to change the default password of all and any devices that are installed.
What can I do as a device owner?
- Check whether the device manufacturer/service provider offers firmware/software upgrades in case of security issues.
- Consider what data is generated and how it’s used and stored, for example, locally and/or in the cloud.
- Check user terms and conditions to find out how data is used.
- Remember to change the default device password.
- Remember to keep device software up to date.
- Remember to wipe the device before recycling.
And remember to consider the trustworthiness of a device and its services before purchase!
More reading
Read about Ericsson’s contribution to IoT security protocol standard OSCORE, which aims to optimize the computational strain on constrained devices, and keep a low overhead, while maintaining a high level of security.
Read our blog post on evolving SIM solutions for IoT. Such solutions allow the use of the well-established identity management features of mobile networks also for IoT deployments where manual SIM card handling isn’t feasible.
Explore Ericsson telecom security and security management.
Learn more about our research into the future of network security.
Feature/OPED
Guide to Employee Training That Reinforces Workplace Safety Standards
Workplace safety is not sustained by policies alone. It is built through consistent training that shapes daily behaviour, decision-making, and accountability across every level of an organisation. When employees understand not only what safety rules exist but why they matter, they are far more likely to follow them and intervene when risks arise. Effective safety-focused training protects workers, strengthens operations, and reduces costly incidents that disrupt productivity and morale.
As industries evolve and workplaces become more complex, employee training must go beyond basic orientation sessions. Reinforcing safety standards requires an ongoing, structured approach that adapts to new risks, changing regulations, and real-world job demands. A thoughtful training strategy helps create a culture where safety is a shared responsibility rather than a checklist item.
Establishing a Foundation of Safety Awareness
The first purpose of workplace safety training is awareness. Employees cannot avoid hazards they do not understand. Comprehensive training introduces common workplace risks, clarifies acceptable behaviour, and sets expectations for personal responsibility. This foundational knowledge empowers employees to recognise unsafe conditions before incidents occur.
Safety awareness training should be tailored to the specific environment in which employees work. Office settings require education on ergonomics, electrical safety, and emergency evacuation procedures, while industrial workplaces demand detailed instruction on machinery risks, protective equipment, and material handling. When training reflects actual job conditions, employees are more engaged and better equipped to apply what they learn.
Clear communication is essential during this stage. Using plain language and real examples helps employees connect training concepts to daily tasks. When safety awareness becomes part of how employees think and talk about their work, it begins to shape behaviour consistently across the organisation.
Integrating Safety Training into Daily Operations
Safety training is most effective when it is integrated into everyday work rather than treated as a one-time event. Ongoing reinforcement ensures that safety standards remain top of mind as tasks, equipment, and responsibilities change. Regular training sessions create opportunities to refresh knowledge, address new risks, and correct unsafe habits before they lead to injury.
Incorporating short safety discussions into team meetings helps normalise these conversations. Supervisors play a critical role by modelling safe behaviour and reinforcing expectations during routine interactions. When employees see safety emphasised alongside productivity goals, it reinforces the message that both are equally important.
Hands-on training also strengthens retention. Demonstrations, practice scenarios, and real-time feedback allow employees to apply safety principles in controlled settings. This experiential approach builds confidence and reduces hesitation when employees encounter hazards in real situations.
Aligning Training with Regulatory Requirements
Workplace safety training must align with applicable regulations and industry standards to ensure legal compliance and worker protection. Laws and regulations change frequently, making it essential for organisations to keep training materials updated. Failure to do so can expose employees to unnecessary risk and organisations to legal consequences.
Training programs should clearly explain relevant safety regulations and how they apply to specific roles. Employees are more likely to comply when rules are presented as practical safeguards rather than abstract mandates. Documenting training completion and maintaining accurate records also demonstrates organisational commitment to compliance.
Many organisations rely on support from compliance training companies to navigate complex regulatory landscapes and design programs that meet both legal and operational needs. These partnerships can help ensure training remains accurate, consistent, and aligned with evolving requirements without overwhelming internal resources.
Encouraging Participation and Accountability
Effective safety training depends on active participation rather than passive attendance. Employees should be encouraged to ask questions, share concerns, and contribute insights based on their experiences. When workers feel heard, they become more invested in maintaining a safe environment.
Creating accountability is equally important. Training should clarify individual responsibilities and outline the consequences of ignoring safety standards. Employees need to understand that safety is not optional or secondary to performance goals. Reinforcement from leadership ensures that unsafe behaviour is addressed consistently and constructively.
Peer accountability also strengthens safety culture. When training emphasises teamwork and shared responsibility, employees are more likely to watch out for one another and intervene when they see risky behaviour. This collective approach reduces reliance on supervision alone and builds resilience across the workforce.
Adapting Training for Long-Term Effectiveness
Workplace safety training must evolve alongside organisational growth and workforce changes. New hires, role transitions, and technological updates introduce risks that require refreshed instruction. Periodic assessments help identify gaps in knowledge and opportunities for improvement.
Data from incident reports, near misses, and employee feedback provides valuable insight into training effectiveness. Adjusting content based on real outcomes ensures that training remains relevant and impactful. Organisations that treat training as a dynamic process are better equipped to respond to emerging risks.
Long-term effectiveness also depends on reinforcement beyond formal sessions. Visual reminders, updated procedures, and accessible reporting tools help sustain awareness. When safety standards are supported through multiple channels, employees receive consistent cues that reinforce training messages daily.
Conclusion
Reinforcing workplace safety standards through employee training requires intention, consistency, and adaptability. Training that builds awareness, integrates into daily operations, aligns with regulations, and encourages accountability creates a safer environment for everyone involved. When employees understand their role in maintaining safety, they are more confident, engaged, and prepared to prevent harm.
A strong training program is not simply a compliance exercise. It is an investment in people and performance. Organisations that prioritise meaningful safety training protect their workforce while fostering trust, stability, and long-term success.
Feature/OPED
Debt is Dragging Nigeria’s Future Down
By Abba Dukawa
A quiet fear is spreading across the hearts of Nigerians—one that grows heavier with every new headline about rising debt. It is no longer just numbers on paper; it feels like a shadow stretching over the nation’s future. The reality is stark and unsettling: nearly 50% of Nigeria’s revenue is now used to service debt. That is not just unsustainable—it is suffocating.
Behind these figures lies a deeper tragedy. Millions of Nigerians are trapped in what experts call “Multidimensional Poverty,” struggling daily for dignity and survival, while a privileged few continue to live in comfort, untouched by the hardship tightening around the nation. The contrast is painful, and the silence around it is even louder.
Since assuming office, Bola Ahmed Tinubu has embarked on an aggressive borrowing path, presenting it as a necessary step to revive the economy, rebuild infrastructure, and stabilise key sectors.
Between 2023 and 2026, billions of dollars have been secured or proposed in foreign loans. On paper, it is a strategy of hope. But in the hearts of many Nigerians, it feels like a gamble with consequences yet to unfold.
The numbers are staggering. A borrowing plan exceeding $21 billion, backed by the National Assembly, alongside additional billions in loans and grants, signals a government determined to keep spending and building. Another $6.9 billion facility follows closely behind. These are not just financial decisions; they are commitments that will echo into generations yet unborn.
And so, the questions refuse to go away. Who will bear this burden? Who will repay these debts when the time comes? Will it not fall on ordinary Nigerians already stretched thin to carry the weight of decisions they never made?
There is a growing fear that the nation may be walking into a future where its people become strangers in their own land, bound by obligations to distant creditors.
Even more troubling is the sense that something is not adding up. The removal of fuel subsidy was meant to free up resources, to create breathing room for meaningful development.
But where are the results? Why does it feel like sacrifice has not translated into relief? The silence surrounding these questions breeds suspicion, and suspicion slowly erodes trust. As of December 31, 2025, Nigeria’s public debt has risen to N159.28 trillion, according to the Debt Management Office.
The numbers keep climbing, but for many citizens, life keeps declining. This disconnect is what hurts the most. Borrowing, in itself, is not the enemy. Nations borrow to grow, to build, to invest in their future. But borrowing without visible progress, without accountability, without compassion for the people, it begins to feel less like strategy and more like a slow descent.
If these borrowed funds are truly building roads, schools, hospitals, and opportunities, then Nigerians deserve to see it, to feel it, to live it. But if they are funding excess, waste, or luxury, then this path is not just dangerous—it is devastating.
Nigeria’s growing loan profile is a double-edged sword. It can either accelerate development or deepen economic challenges. The key issue is not just borrowing, but what the country does with the money. Strong governance, transparency, and investment in productive sectors will determine whether these loans become a foundation for growth or a long-term liability. Because in the end, debt is not just an economic issue. It is a moral one. And if care is not taken, the price Nigeria will pay may not just be financial—it may be the future of its people.
Dukawa writes from Kano and can be reached at [email protected]
Feature/OPED
Nigeria’s Power Illusion: Why 6,000MW Is Not An Achievement
By Isah Kamisu Madachi
For decades, Nigeria has been called the Giant of Africa. The question no one in government wants to answer is why a giant cannot keep the lights on.
Nigeria sits on the largest proven oil reserves in Africa, holds the continent’s most populous nation at over 220 million people, and commands the fourth largest GDP on the continent at roughly $252 billion. It possesses vast deposits of solid minerals, a fintech ecosystem that accounts for 28% of all fintech companies on the African continent, and a diaspora that remits billions of dollars annually.
If potential were electricity, Nigeria would have been powering half the world. Instead, an immediate former minister is boasting about 6,000 megawatts.
Adebayo Adelabu resigned as Minister of Power on April 22, 2026, citing his ambition to contest the Oyo State governorship election. In his resignation letter, he listed among his achievements that peak generation had increased to over 6,000 megawatts during his tenure, supported by the integration of the Zungeru Hydropower Plant. It was presented as a great crowning legacy. The claim deserves scrutiny, and the numbers deserve context.
To begin with, the context. Ghana, Nigeria’s neighbour in West Africa, has a national electricity access rate of 85.9%, with 74% access in rural areas and 94% in urban areas. Kenya, with a 71.4% national electricity access rate, including 62.7% in rural areas, leads East Africa. Nigeria, by contrast, recorded an electricity access rate of just 61.2 per cent as of 2023, according to the World Bank. This is not a distant or poorer country outperforming Nigeria. Ghana’s GDP stands at approximately $113 billion, less than half of Nigeria’s. Kenya’s economy is around $141 billion. Ethiopia, which has invested massively in the Grand Ethiopian Renaissance Dam and is already exporting electricity to neighbouring countries, has a GDP of roughly $126 billion. All three are doing more with far less.
Now to examine the 6,000-megawatt, Daily Trust obtained electricity generation data from the Association of Power Generation Companies and the Nigerian Electricity Regulatory Commission, covering quarterly performance from 2023 to 2025 and monthly data from January to March 2026. The data shows that in 2023, peak generation was approximately 5,000 megawatts; in 2024, it reached approximately 5,528 megawatts; in 2025, it ranged between 5,300 and 5,801 megawatts; and by March 2026, available capacity had declined to approximately 4,089 megawatts. The grid never recorded a verified peak of 6,000 megawatts or higher. Adelabu had, in fact, set the 6,000-megawatt target publicly on at least three separate occasions, missing each deadline, and later admitted the target was not achieved, attributing the failure to vandalism of key transmission infrastructure.
In February 2026, Nigeria’s national grid produced an average available capacity of 4,384 megawatts, the lowest monthly average since June 2024. For a country with over 220 million people, this means electricity supply remains far below national demand, with the grid delivering only about 32 per cent of its theoretical installed capacity of approximately 13,000 megawatts. To put that in sharper comparison: in 2018, 48 sub-Saharan African countries, home to nearly one billion people, produced about the same amount of electricity as Spain, a country of 45 million. Nigeria, the continent’s most resource-rich large economy, is a significant part of that embarrassing equation.
The tragedy here is not just technical. It is a governance failure with compounding human costs. An economy that cannot provide reliable electricity cannot competitively manufacture goods, cannot industrialise at scale, cannot attract the volume of foreign direct investment its endowments warrant, and cannot build the digital infrastructure that would allow it to lead on artificial intelligence, data governance, and the emerging critical minerals economy where Africa’s next great opportunity lies. Countries with a fraction of Nigeria’s mineral wealth and human capital are already debating those frontiers. Nigeria is still campaigning on megawatts.
What a departing minister should be able to say, given Nigeria’s endowments, is not that peak generation touched 6,000 megawatts at some unverified moment. He should be saying that Nigeria now generates reliably above 15,000 megawatts, that rural electrification has crossed 70 per cent, and that the country is on a credible trajectory toward the kind of energy sufficiency that unlocks industrial growth. That is the standard Nigeria’s size and resources demand. Anything below it is not an achievement. It is an apology dressed in a press release.
The power sector has received billions of dollars in investment across multiple administrations. The 2013 privatisation exercise, the Presidential Power Initiative, the Electricity Act of 2023, and successive reform promises have produced a sector that still, in 2026, cannot guarantee eight hours of reliable supply to the average Nigerian household. That a minister exits that ministry citing a megawatt figure that fact-checkers have shown was never actually reached, and that even if reached would be unworthy of celebration given Nigeria’s potential, captures the full depth of the problem. The ambition is too small. The accountability is too thin. And the country deserves better from those who are privileged to manage its extraordinary, squandered potential.
Isah Kamisu Madachi is a policy analyst and development practitioner. He writes via [email protected]
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism10 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking8 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn
