Feature/OPED
Turning Stolen Hardware into a Data Dead-End
By Apu Pavithran
In Johannesburg, the “city of gold,” the most valuable resource being mined isn’t underground; it’s in the pockets of your employees.
With an average of 189 cellphones reported stolen daily in South Africa, Gauteng province has become the hub of a growing enterprise risk landscape.
For IT leaders across the continent, a “lost phone” is rarely a matter of a misplaced device. It is frequently the result of a coordinated “snatch and grab,” where the hardware is incidental, and corporate data is the true objective.
Industry reports show that 68% of company-owned device breaches stem from lost or stolen hardware. In this context, treating mobile security as a “nice-to-have” insurance policy is no longer an option. It must function as an operational control designed for inevitability.
In the City of Gold, Data Is the Real Prize
When a fintech agent’s device vanishes, the $300 handset cost is a rounding error. The real exposure lies in what that device represents: authorised access to enterprise systems, financial tools, customer data, and internal networks.
Attackers typically pursue one of two outcomes: a quick wipe for resale on the secondary market or, far more dangerously, a deep dive into corporate apps to extract liquid assets or sellable data.
Clearly, many organisations operate under the dangerous assumption that default manufacturer security is sufficient. In reality, a PIN or fingerprint is a flimsy barrier if a device is misconfigured or snatched while unlocked. Once an attacker gets in, they aren’t just holding a phone; they are holding the keys to copy data, reset passwords, or even access admin tools.
The risk intensifies when identity-verification systems are tied directly to the compromised device. Multi-Factor Authentication (MFA), widely regarded as a gold standard, can become a vulnerability if the authentication factor and the primary access point reside on the same compromised device. In such cases, the attacker may not just have a phone; they now have a valid digital identity.
The exposure does not end at authentication. It expands with the structure of the modern workforce.
65% of African SMEs and startups now operate distributed teams. The Bring Your Own Device (BYOD) culture has left many IT departments blind to the health of their fleet, as personal devices may be outdated or jailbroken without any easy way to know.
Device theft is not new in Africa. High-profile incidents, including stolen government hardware, reinforce a simple truth: physical loss is inevitable. The real measure of resilience is whether that loss has any residual value. You may not stop the theft. But you can eliminate the reward.
Theft Is Inevitable, Exposure is Not
If theft cannot always be prevented, systems must be designed so that stolen devices yield nothing of consequence. This shift requires structured, automated controls designed to contain risk the moment loss occurs.
Develop an Incident Response Plan (IRP)
The moment a device is reported missing, predefined actions should trigger automatically: access revocation, session termination, credential reset and remote lock or wipe.
However, such technical playbooks are only as fast as the people who trigger them. Employees must be trained as the first line of defence —not just in the use of strong PINs and biometrics, but in the critical culture of immediate reporting. In high-risk environments, containment windows are measured in minutes, not hours.
Audit and Monitor the Fleet Regularly
Control begins with visibility. Without a continuous, comprehensive audit, IT teams are left responding to incidents after damage has occurred.
Opting for tools like Endpoint Detection and Response (EDR) allows IT teams to spot subtle, suspicious activities or unusual access attempts that signal a compromised device.
Review Device Security Policies
Security controls must be enforced at the management layer, not left to user discretion. Encryption, patch updates and screen-lock policies should be mandatory across corporate devices.
In BYOD environments, ownership-aware policies are essential. Corporate data must remain governed by enterprise controls regardless of device ownership.
Decouple Identity from the Device
Legacy SMS-based authentication models introduce avoidable risk when the authentication channel resides on the compromised handset. Stronger identity models, including hardware tokens, reduce this dependency.
At the same time, native anti-theft features introduced by Apple and Google, such as behavioural theft detection and enforced security delays, add valuable defensive layers. These controls should be embedded into enterprise baselines rather than treated as optional enhancements.
When Stolen Hardware Becomes Worthless
With POPIA penalties now reaching up to R10 million or a decade of imprisonment for serious data loss offences, the Information Regulator has made one thing clear: liability is strict, and the financial fallout is absolute. Yet, a PwC survey reveals a staggering gap: only 28% of South African organisations are prioritising proactive security over reactive firefighting.
At the same time, the continent is battling a massive cybersecurity skills shortage. Enterprises simply do not have the boots on the ground to manually patch every vulnerability or chase every “lost” terminal. In this climate, the only viable path is to automate the defence of your data.
Modern mobile device management (MDM) platforms provide this automation layer.
In field operations, “where” is the first indicator of “what.” If a tablet assigned to a Cape Town district suddenly pings on a highway heading out of the city, you don’t need a notification an hour later—you need an immediate response. An effective MDM system offers geofencing capabilities, automatically triggering a remote lock when devices breach predefined zones.
On Supervised iOS and Android Enterprise devices, enforced Factory Reset Protection (FRP) ensures that even after a forced wipe, the device cannot be reactivated without organisational credentials, eliminating resale value.
For BYOD environments, we cannot ignore the fear that corporate oversight equates to a digital invasion of personal lives. However, containerization through managed Work Profiles creates a secure boundary between corporate and personal data. This enables selective wipe capabilities, removing enterprise assets without intruding on personal privacy.
When integrated with identity providers, device posture and user identity can be evaluated together through multi-condition compliance rules. Access can then be granted, restricted, or revoked based on real-time risk signals.
Platforms built around unified endpoint management and identity integration enable this model of control. At Hexnode, this convergence of device governance and identity enforcement forms the foundation of a proactive security mandate. It transforms mobile fleets from distributed risk points into centrally controlled assets.
In high-risk environments, security cannot be passive. The goal is not recovery. It is irrelevant, ensuring that once a device leaves authorised hands, it holds no data, no identity leverage, and no operational value.
Apu Pavithran is the CEO and founder of Hexnode
Feature/OPED
Love, Culture, and the New Era of Televised Weddings
Weddings have always held a special place in African culture. They are more than ceremonies; they are declarations of love, family, identity, and tradition. From the vibrant colours of aso-ebi to the rhythmic sounds of live bands and the emotional exchange of vows, weddings represent a moment of cultural heritage.
In recent years, weddings have gone beyond physical venues. What was once an exclusive gathering for family and friends has transformed into a shared experience for wider audiences. Social media first opened the door, allowing guests and admirers to witness love stories in real time through Instagram posts, TikTok highlights, and YouTube recaps.
And now, television platforms are taking this even further, giving weddings a new kind of permanence and reach.
High-profile weddings, like the widely celebrated union of Adeyemi Idowu, popularly known as Yhemolee (Olowo Eko) and his wife Oyindamola, fondly known as ThayourB, captured massive public attention. Moments from their wedding became a live shared experience on television (GOtv & DStv).
From the high fashion statements to the emotional highlights, viewers were able to feel part of something bigger, a reminder that weddings inspire not just both families but entire communities.
This shift reflects a broader reality: weddings today are content. They inspire conversations about fashion, relationships, lifestyle, and aspiration. They preserve memories in ways previous generations could only imagine. For Gen Z couples, their wedding is no longer just a day; it becomes a story that can be revisited, celebrated, and even inspire others planning their own journey to forever.
Broadcast platforms like GOtv are playing a meaningful role in this transformation. By bringing wedding-related content directly into homes, GOtv is helping audiences experience these moments not just through social media snippets but in real time.
One of the most notable offerings is Channel 105, The Wedding Channel, Africa’s first 24-hour wedding channel, available on GOtv. The channel is fully dedicated to African weddings, lifestyle, and bridal fashion, showcasing everything from dream ceremonies to the realities of married life. Programs like Wedding Police and Wedding on a Budget, and shows like 5 Years Later, offer a deeper look into marriage itself, reminding viewers that weddings are just the beginning of a lifelong journey.
GOtv is preserving culture, celebrating love, and inspiring future couples with this channel. It allows viewers to witness traditions from different regions, discover new ideas, and feel connected to moments that might otherwise remain private.
With platforms like GOtv, stories continue to live on screens across Africa, where love, culture, and celebration can be experienced by all.
To upgrade, subscribe, or reconnect, download the MyGOtv App or dial *288#. For catch-up and on-the-go viewing, download the GOtv Stream App and enjoy your favourite shows anytime, anywhere.
Feature/OPED
Brent’s Jump Collides with CBN Easing, Exposes Policy-lag Arbitrage
Nigeria is entering a timing-sensitive macro set-up as the oil complex reprices disruption risk and the US dollar firms. Brent moved violently this week, settling at $77.74 on 02 March, up 6.68% on the day, after trading as high as $82.37 before settling around $78.07 on 3 March. For Nigeria, the immediate hook is the overlap with domestic policy: the Central Bank of Nigeria (CBN) has just cut its Monetary Policy Rate (MPR) by 50 basis points to 26.50%, whilst headline inflation is still 15.10% year on year in January.
“Investors often talk about Nigeria as an oil story, but the market response is frequently a timing story,” said David Barrett, Chief Executive Officer, EBC Financial Group (UK) Ltd. “When the pass-through clock runs ahead of the policy clock, inflation risk, and United States Dollar (USD) demand can show up before any oil benefit is felt in day-to-day liquidity.”
Policy and Pricing Regime Shift: One Shock, Different Clocks
EBC Financial Group (“EBC”) frames Nigeria’s current set-up as “policy-lag arbitrage”: the same external energy shock can hit domestic costs, FX liquidity, and monetary transmission on different timelines. A risk premium that begins in crude can quickly show up in delivered costs through freight and insurance, and EBC notes that downstream pressure has been visible in refined markets, with jet fuel and diesel cash premiums hitting multi-year highs.
Market Impact: Oil Support is Conditional, Pass-through is Not
EBC points out that higher crude is not automatically supportive of the naira in the short run because “oil buffer” depends on how quickly external receipts translate into market-clearing USD liquidity. Recent price action illustrates the sensitivity: the naira was quoted at 1,344 per dollar on the official market on 19 February, compared with 1,357 a week earlier, whilst street trading was cited around 1,385.
At the same time, Nigeria’s inflation channel can move quickly even during disinflation: headline inflation eased to 15.10% in January from 15.15% in December, and food inflation slowed to 8.89% from 10.84%, but energy-led transport and logistics costs can reintroduce pressure if the risk premium persists. EBC also points to a broader Nigeria-specific reality: the economy grew 4.07% year on year in 4Q25, with the oil sector expanding 6.79% and non-oil 3.99%, whilst average daily oil production slipped to 1.58 million bpd from 1.64 million bpd in 3Q25. That mix supports external-balance potential, but it also underscores why the domestic liquidity benefit can arrive with a lag.
Nigeria’s Buffer Looks Stronger, but It Does Not Eliminate Sequencing Risk
EBC sees that near-term external resilience is improving. The CBN Governor said gross external reserves rose to USD 50.45 billion as of 16 February 2026, equivalent to 9.68 months of import cover for goods and services. Even so, EBC views the market’s focus as pragmatic: in a risk-off tape, investors tend to price the order of transmission, not the eventual balance-of-payments benefit.
In the near term, EBC expects attention to rotate to scheduled energy and policy signposts that can confirm whether the current repricing is a short, violent adjustment or a more durable regime shift, including the U.S. Energy Information Administration (EIA) Short-Term Energy Outlook (10 March 2026), OPEC’s Monthly Oil Market Report (11 March 2026), and the U.S. Federal Reserve meeting (17 to 18 March 2026). On the domestic calendar, the CBN’s published schedule points to the next Monetary Policy Committee meeting on 19 to 20 May 2026.
Risk Frame: The Market Prices the Lag, Not the Headline
EBC cautions that outcomes are asymmetric. A rapid de-escalation could compress the crude risk premium quickly, but once freight, insurance, and hedging behaviour adjust, second-round effects can linger through inflation uncertainty and a more persistent USD bid.
“Oil can act as a shock absorber for Nigeria, but only when the liquidity channel is working,” Barrett added. “If USD conditions tighten first and domestic pass-through accelerates, the market prices the lag, not the headline oil price.”
Brent remains an anchor instrument for tracking this timing risk because it links energy-led inflation expectations, USD liquidity, and emerging-market risk appetite in one market. EBC Commodities offering provides access to Brent Crude Spot (XBRUSD) via its trading platform for following energy-driven macro volatility through a single instrument.
Feature/OPED
Gen Alpha: Africa’s Digital Architects, Not Your Target Audience
By Emma Kendrick Cox
This year, the eldest Gen Alpha turns 16.
That means they aren’t just the future of our work anymore. They are officially calling for a seat at the table, and they’ve brought their own chairs. And if you’re still calling this generation born between 2010 and 2025 the iPad generation, then I hate to break it to you, but you’re already obsolete. To the uninitiated, they look like a screen-addicted mystery. To those of us paying attention, they are the most sophisticated, commercially potent, and culturally fluent architects Africa has ever seen.
Why? Because Alphas were not born alongside the internet. They were born inside it. And by 2030, Africa will be home to one in every three Gen Alphas on the planet.
QWERTY the Dinosaur
We are witnessing the rise of a generation that writes via Siri and speech-to-text before they can even hold a pencil. With 63% of these kids navigating smartphones by age five, they don’t see a QWERTY keyboard as a tool. They see it as a speed bump, the long route, an inefficient use of their bandwidth. They don’t need to learn how to use tech because they were born with the ability to command their entire environment with a voice note or a swipe.
They are platform agnostic by instinct. They don’t see boundaries between devices. They’ll migrate from an Android phone to a Smart TV to an iPhone without breaking their stride. To them, the hardware is invisible…it’s the experience that matters.
They recognise brand identities long before they know the alphabet. I share a home with a peak Gen Alpha, age six and a half (don’t I dare forget that half). When she hears the ding-ding-ding-ding-ding of South Africa’s largest bank, Capitec’s POS machine, she calls it out instantly: “Mum! Someone just paid with Capitec!” It suddenly gives a whole new meaning to the theory of brand recall, in a case like this, extending it into a mental map of the financial world drawn long before Grade 2.
And it ultimately lands on this: This generation doesn’t want to just view your brand from behind a glass screen. They want to touch it, hear it, inhabit it, and remix it. If they can’t live inside your world, you’re literally just static.
The Uno Reverse card
Unlike any generation we’ve seen to date, households from Lagos to Joburg and beyond now see Alphas hold the ultimate Uno Reverse card on purchasing power. With 80% of parents admitting their kids dictate what the family buys, these Alphas are the unofficial CTOs and Procurement Officers of the home:
-
The hardware veto: Parents pay the bill, but Alphas pick the ISP based on Roblox latency and YouTube 4K buffers.
-
The Urban/Rural bridge: In the cities, they’re barking orders at Alexa. In rural areas, they are the ones translating tech for their families and narrowing the digital divide from the inside out.
-
The death of passive: I’ll fall on my sword when I say that with this generation, the word consumer is dead. It implies they just sit there and take what you give them, when, on the contrary, it is the total opposite. Alphas are Architectural. They are not going to buy your product unless they can co-author the experience from end to end.
As this generation creeps closer and closer to our bullseye, the team here at Irvine Partners has stopped looking at Gen Alpha as a demographic and started seeing them as the new infrastructure of the African market. They are mega-precise, fast, and surgically informed.
Believe me when I say they’ve already moved into your industry and started knocking down the walls. The only question is: are you building something they actually want to live in, or are you just a FaceTime call they are about to decline?
Pay attention. Big moves are coming. The architects are here.
Emma Kendrick Cox is an Executive Creative Director at Irvine Partners
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism10 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking8 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn











