Connect with us

Technology

Avoiding Security Complexities

Published

on

Security Complexities

Many years ago, the firewall was everything. Defence-in depth was a concept defined as layered defence with multiple firewalls on the path.

Behind the firewall was a fortress. Organisations designed networks with strong perimeters and demilitarised zones to ensure the crown jewels were well-protected. Attackers had a difficult time trying to break into the firewalls.

On the physical layer, Network Admission Control (NAC) technologies were implemented to prevent intruders from having direct access into the network by preventing them from plugging unauthorised devices into the network. Before a device was admitted, it had to meet a minimum requirement defined by the organisation.

Those years are gone and maybe gone forever. Cloud computing, Bring Your Own Device (BYOD), Artificial Intelligence, Internet of Things (IoT), VPNs and Remote Working Capabilities have dramatically changed the way businesses run.

These technologies have introduced a level of innovation and disruption that were unimaginable only a few years ago. They have resulted in the collapse of the traditional network perimeter, thereby increasing the attack surface for cyber-attacks. Enterprise networks coverage is today being extended beyond our imagination – outside the traditional datacentres to smartphones, cloud platforms, mobile computers and IoT interfaces without geographical boundaries.

The bad guys now have a plethora of interfaces to launch their attacks on; they do not have to breach the network using traditional social engineering tactics physically.

The recent changes in the work environment occasioned by the COVID-19 have further amplified the extension of network boundaries beyond the traditional datacentres. Employees work from home with devices and connections into the enterprise networks that were not originally designed for such. Improvised connections were made to allow functionality because the pandemic came without announcement.

The danger this poses is that some of these end devices were not originally designed with security in mind. Even if security was a consideration, not so much for enterprise data protection. These devices are most of the time not hardened, and their owners may not understand the effects on the overall organisational security posture.

A handful of these devices are installed with default passwords, and most times, these passwords are not changed during or after installation.

So, it is easy to guess the password by manual methods or using advanced dictionary or brute force attack methods. Another risk posed by these endpoints is the lack of security updates and patches. Because they are sometimes not seen to be part of the enterprise network, they are not included in the patch management programme, and their presence introduces high-level vulnerabilities within the enterprise network.

It then becomes easier to utilise malware that could tunnel through the firewall to breach the enterprise network, instead of spending months and years trying to break into the firewall or layers of firewalls.

In recent years, large-scale attacks have been launched using malware by exploiting known vulnerabilities and security gaps on endpoints.

For example, the WannaCry, Petya and another variant of Petya, the NotPetya were employed to launch attacks on enterprise networks through vulnerable endpoints. Another danger with this trend is potential data leakage because these devices are used to either temporarily or permanently store organisational data.

There is also concern about device loss. If these devices are lost, there is a risk of exposing the organisation’s data to unauthorised entities, and that could both result in financial and reputational damage.

These dangers are also expanded by the impact of the COVID 19 pandemic, where organisations made ad hoc improvisions to support businesses while employees work from home.

As commerce resumes, organisations are beginning to discover some capabilities to support their businesses remotely, and they are also rethinking their business continuity strategies.

For some businesses, this is not just a temporal shift, but a change which has permanently altered the operational procedures of the organisation.

Legacy cybersecurity strategies, techniques and investments will not be enough to mitigate the rising cybersecurity concerns introduced by this new way of working. Protection has gone beyond throwing in uncoordinated technical solutions and efforts.

Organisations need to rethink a new approach for the protection of their assets within the ever-growing complexity both to remain afloat and also to derive commensurate Returns On Security Investments (ROSI). A well-crafted strategy will ensure that cybersecurity efforts are coordinated within the enterprise, without duplication of efforts and resources, which will, in turn, drive down the cost of implementing cybersecurity initiatives.

To improve the security posture, organisations must do the following:

    Continuously monitor the devices, applications, and processes running on the network.

    Automate security monitoring and mitigation.

    Implement systems that are capable of automatic detection, isolation and containment of threats within the network.

    Ensure that monitoring covers event data, session data, and historical data on endpoint usages, such as past processes, network connections, and other information.

Another measure organisations should take is reducing complexities. The extension of the network boundaries has not stopped organisations from using existing network solutions to protect the enterprise network.

However, in a bid to ensure the protection of the on-premise infrastructure and the ones beyond the organisational traditional network boundaries, organisations combine existing technologies with new solutions and the resultant effect is an increase in complexity.

To effectively manage security, organisations should put measures in place to ensure a reduction in complexity and enhancing visibility. This can be achieved by unifying all efforts and technologies for managing both on-premise and off-premise infrastructure in a single platform. Beyond technical controls, organisations should develop procedures, standards, and policies for acceptable use of organisational resources.

For further information and engagements on the pcl. cyber security services, send an email to [email protected]

Technology

Leticia Otomewo Becomes Secure Electronic Technology’s Acting Secretary

Published

on

Secure Electronic Technology

By Aduragbemi Omiyale

One of the players in the Nigerian gaming industry, Secure Electronic Technology (SET) Plc, has appointed Ms Leticia Otomewo as its acting secretary.

This followed the expiration of the company’s service contract with the former occupier of the seat, Ms Irene Attoe, on January 31, 2026.

A statement to the Nigerian Exchange (NGX) Limited on Thursday said Ms Otomewo would remain the organisation’s scribe in an acting capacity, pending the ratification and appointment of a substantive company secretary at the next board meeting.

She was described in the notice signed by the Managing Director of the firm, Mr Oyeyemi Olusoji, as “a results-driven executive with 22 years of experience in driving business growth, leading high-performing teams, and delivering innovative solutions.”

The acting secretary is also said to be “a collaborative leader with a passion for mentoring and developing talent.”

“The company assures the investing public that all Company Secretariat responsibilities and regulatory obligations will continue to be discharged in full compliance with the Companies and Allied Matters Act, applicable regulations, and the Nigerian Exchange Limited Listing Rules,” the disclosure assured.

Meanwhile, the board thanked Ms Attoe “for professionalism and contributions to the Company during the period of her engagement and wishes her well in her future endeavours.”

Continue Reading

Technology

Russia Blocks WhatsApp Messaging Service

Published

on

WhatsApp Self Messaging Feature

By Adedapo Adesanya

The Russian government on Thursday confirmed it has blocked the WhatsApp messaging service, as it moves to further control information flow in the country.

It urged Russians to use a new state-backed platform called Max instead of the Meta-owned service.

WhatsApp issued a statement earlier saying Russia had attempted to “fully block” its messaging service in the country to force people toward Max, which it described as a “surveillance app.”

“Today the Russian government attempted to fully block WhatsApp in an effort to drive people to a state-owned surveillance app,” WhatsApp posted on social media platform X.

“Trying to isolate over 100 million users from private and secure communication is a backwards step and can only lead to less safety for people in Russia,” it said, adding: “We continue to do everything we can to keep users connected.”

Russia’s latest move against social media platforms and messaging services like WhatsApp, Signal and Telegram comes amid a wider attempt to drive users toward domestic and more easily controlled and monitored services, such as Max.

Russia’s telecoms watchdog, Roskomnadzor, has accused messaging apps Telegram and WhatsApp of failing to comply with Russian legislation requiring companies to store Russian users’ data inside the country, and of failing to introduce measures to stop their platforms from being used for allegedly criminal or terrorist purposes.

It has used this as a basis for slowing down or blocking their operations, with restrictions coming into force since last year.

For Telegram, it may be next, but so far the Russian government has been admittedly slowing down its operations “due to the fact that the company isn’t complying with the requirements of Russian legislation.”

The chat service, founded by Russian developers but headquartered in Dubai, has been a principal target for Roskomnadzor’s scrutiny and increasing restrictions, with users reporting sluggish performance on the app since January.

Continue Reading

Technology

Nigerian AI Startup Decide Ranks Fourth Globally for Spreadsheet Accuracy

Published

on

Nigerian AI Startup Decide

By Adedapo Adesanya

Nigerian startup, Decide, has emerged as the fourth most accurate Artificial Intelligence (AI) agent for spreadsheet tasks globally, according to results from SpreadsheetBench, a widely referenced benchmark for evaluating AI performance on real-world spreadsheet problems.

According to the founder, Mr Abiodun Adetona, the ranking places Decide alongside well-funded global AI startups, including Microsoft, OpenAI, and Anthropic.

Mr Adetona, an ex-Flutterwave developer, also revealed that Decide now has over 3,000 users, including some who are paying customers, a signal to the ability of the startup to scale in the near future.

SpreadsheetBench is a comprehensive evaluation framework designed to push Large Language Models (LLMs) to their limits in understanding and manipulating spreadsheet data. While many benchmarks focus on simple table QA, SpreadsheetBench treats a spreadsheet as a complex ecosystem involving spatial layouts, formulas, and multi-step reasoning. So far, only three agents rank higher than Decide, namely Nobie Agent, Shortcut.ai, and Qingqiu Agent.

Mr Adetona said SpreadsheetBench measures how well AI agents can handle practical spreadsheet tasks such as writing formulas, cleaning messy data, working across multiple sheets, and reasoning through complex Excel workflows. Decide recorded an 82.5% accuracy score, solving 330 out of 400 verified tasks.

“The result reflects sustained investment in applied research, product iteration, and learning from real-world spreadsheet workloads across a wide range of use cases,” Mr Adetona told Business Post.

For Mr Adetona, who built Decide out of frustration with how much time professionals spend manually cleaning data, debugging formulas, and moving between sheets, “This milestone highlights how focused engineering and domain-specific AI development can deliver frontier-level performance outside of large research organisations. By concentrating on practical business data problems and building systems grounded in real user environments, we believe smaller teams can contribute meaningfully to advancing applied AI.”

“For Decide, this is a foundation for continued progress in intelligent spreadsheet and analytics automation,” he added.

Continue Reading

Trending