Technology
How Businesses Can Prevent and Combat Cyber Threats
By Otori Emmanuel
Online business may have its benefits, but there is also a greater chance of hoaxes and cyber threats. The credibility of your business could be negatively affected by a successful cyber-attack. Therefore, safeguarding your business against cyber-attack is a crucial concern. That, if not prevented, may require a re-establishment of the business.
In extreme scenarios, it may even force you out of business permanently because you won’t be able to make up the lost revenue and customer loyalty, as clients want to feel safe in transactions. The good news is that you may take preventative action and safeguard your company before it’s too late by choosing from a selection of cyber insurance alternatives.
Preventive measures against cyber threats
- Installation of Devices and Network Security Software
Verify that your operating system and security applications are set to update automatically. Updates might include vital security upgrades for recent malware and threats. Most updates allow you to schedule them at a time that is more convenient for you, typically after office hours. It’s imperative to consistently follow update prompts since updates frequently fix serious security issues. Install security software to help prevent infection on business PCs and mobile devices. To prevent compromise on business laptops, desktops, and mobile devices, the software should have anti-virus, anti-spyware, and anti-spam filters. Setting up a firewall between your working devices and the internet acts as a gatekeeper for traffic entering and leaving. Maintain a robust firewall by regularly updating to the newest patches.
- Passphrase use and setting up several authenticators
If possible, take extra precautions to make your security more difficult to access because you do not want to lose your company to hackers. Instead of using passwords, use passphrases to secure your networks and devices that house sensitive company data. Passphrases are phrases or collections of words that are used as passwords. Humans find them easy to memorize, but computers find them challenging to decipher. A secure passphrase needs to be at least 14 characters long and includes a mix of capital and lowercase letters, digits, and special characters. For each of your accounts, use a different passphrase. If you are serious about protecting your company, changing passwords to passphrases is insufficient. To ensure that the legitimate owners are granting access, multi-factor authentication (MFA) is used in this situation. Before you can access your account, two or more forms of identification must be shown. Additional security for your accounts is provided by two-factor or multi-factor authentication.
- Protect sensitive information
The data that will be sent into and out of your company system needs to be encrypted after you’ve configured your authenticators. Before sending your data over the internet, encryption transforms it into a hidden code. Make sure your network encryption is enabled and that all data received or stored online is encrypted. This lowers the danger of theft, destruction, or tampering by limiting data access to parties that possess the encryption key. When utilizing a public network, you can enable network encryption by adjusting the settings on your router or by setting up a virtual private network (VPN) program on your computer.
- Backup your data
Data backup is one of the cheapest ways to guarantee that your information can be retrieved in the event of a cyber-incident or computer issue. Additionally, it is a less demanding technique to prevent future attacks. Although firewalls, antivirus software, and other security measures may malfunction, keeping a backup provides you with an advantage over attackers. To assist ensure the protection of your data, use a range of backup techniques, like routine incremental backups to a mobile device or cloud storage. Include weekly, quarterly, and yearly server backups as well. It should be regularly checked to see if this data is functioning properly and can be recovered. Store several copies of your backup offline, if possible.
- Your business’s safety is your employees’ safety
Your staff and device operators are responsible for your company’s security. Businesses should have clear cyber security policies that inform staff on what is appropriate while sharing data, using computers and other devices, and visiting websites. Your personnel should receive internet safety instructions making them aware of the dangers they can encounter and their responsibility for keeping your company safe. Hackers might have their access restricted by creating a culture of awareness. This is why it is so important to teach them how to recognize, avoid, and handle a cyber-attack and use strong passwords and passphrases.
Keep track of all the computing hardware and applications that your company employs. All the hardware and software that your company employs must be documented. Any software and hardware that are no longer in use should be disconnected from the network, and sensitive data should be deleted. Older, inactive hardware and software won’t likely be updated, and they could be exploited as a “backdoor” by thieves to attack companies. In a similar vein, you ought to deny access to former workers and people who have switched roles and no longer need it.
- Business continuity is based on customers’ safety
It’s crucial that you protect the information about your clients. Your company’s reputation will suffer if you misplace or compromise their information, and you risk legal repercussions. Make sure your company invests in a safe online transaction environment and protects any stored personal customer data. Find out what your payment gateway provider can do to stop online payment fraud if you accept payments online. Consider purchasing cyber insurance to safeguard your company. Dealing with a cyber-attack may cost far more than simply replacing computers, enhancing security, or repairing databases. Your company may benefit from the cost savings provided by cyber liability insurance coverage for attack recovery.
Technology
Lagos’ Team Nevo Wins 3MTT Southwest Regional Hackathon
By Adedapo Adesanya
Lagos State’s representative, Team Nevo, won the 3 Million Technical Talent (3MTT) South-West Regional Hackathon, on Tuesday, December 9, 2025.
The host state took the victory defeating pitches from other south west states, including Oyo, Ogun, Osun, Ekiti, and Ondo States.
This regional hackathon was a major moment for the 3MTT Programme, bringing together young innovators from across the South-West to showcase practical solutions in AI, software development, cybersecurity, data analysis, and other key areas of Nigeria’s digital future.
Launched by the Federal Ministry of Communications, Innovation, and Digital Economy, the hackathon brought together talented young innovators from across the Southwest region to showcase their digital solutions in areas such as Artificial Intelligence (AI)/Machine Learning, software development, data analysis, and cybersecurity, among others.
“This event not only highlights the potential of youth in South West but also advances the digital economy, fosters innovation, and creates job opportunities for our young people,” said Mr Oluwaseyi Ayodele, the Lagos State Community Manager.
Winning the hackaton was Team Nevo, made up of Miss Lydia Solomon and Mr Teslim Sadiq, whose inclusive AI learning tool which tailors academic learning experiences to skill sets of students got the top nod, with N500,000 in prize money.
Team Oyo represented by Microbiz, an AI business tool solution, came in second place winning N300,000 while Team Ondo’s Fincoach, a tool that guides individuals and businesses in marking smarter financial decisions, came third with N200,000 in prize money.
Others include The Frontiers (Team Osun), Ecocycle (Team Ogun), and Mindbud (Team Ekiti).
Speaking to Business Post, the lead pitcher for Team Nevo, Miss Solomon, noted, “It was a very lovely experience and the opportunity and access that we got was one of a kind,” adding that, “Expect the ‘Nevolution’ as we call it, expect the transformation of the educational sector and how Nevo is going to bring inclusion and a deeper level of understanding and learning to schools all around Nigeria.”
Earlier, during his keynote speech, the chief executive officer (CEO) of Sterling Bank, Mr Abubakar Suleiman, emphasised the need for Nigeria’s budding youth population to tap into the country’s best comparative advantage, drawing parallels with commodities and resources like cocoa, soyabeans, and uranium.
“Tech is our best bet to architect a comparative advantage. The work we are doing with technologies are very vital to levelling the playing field.”
Technology
re:Invent 2025: AWS Excites Tech Enthusiasts With Graviton5 Unveiling
By Aduragbemi Omiyale
One of the high points of the 2025 re:Invent was the unveiling of Graviton5, the fifth generation of custom Arm-based server processors from Amazon Web Services (AWS).
Many tech enthusiasts believe that the company pushed the limits with Graviton5, its most powerful and efficient CPU, frontier agents that can work autonomously for days, an expansion of the Amazon Nova model family, Trainium3 UltraServers, and AWS AI Factories suitable for implementing AI infrastructure in customers’ existing data centres.
Graviton5—the company’s most powerful and efficient CPU
As cloud workloads grow in complexity, organizations face a persistent challenge to deliver faster performance at lower costs and meet sustainability commitments without trade-offs.
AWS’ new Graviton5-based Amazon EC2 M9g delivers up to 25% higher performance than its previous generation, with 192 cores per chip and 5x larger cache.
For the third year in a row, more than half of new CPU capacity added to AWS is powered by Graviton, with 98 per cent of the top 1,000 EC2 customers—including Adobe, Airbnb, Epic Games, Formula 1, Pinterest, SAP, and Siemens—already benefiting from Graviton’s price performance advantages.
Expansion of Nova family of models and pioneers “open training” with Nova Forge
Amazon is expanding its Nova portfolio with four new models that deliver industry-leading price-performance across reasoning, multimodal processing, conversational AI, code generation, and agentic tasks. Nova Forge pioneers “open training,” giving organizations access to pre-trained model checkpoints and the ability to blend proprietary data with Amazon Nova-curated datasets.
Nova Act achieves breakthrough 90% reliability for browser-based UI automation workflows built by early customers. Companies like Reddit are using Nova Forge to replace multiple specialized models with a single solution, while Hertz accelerated development velocity by 5x with Nova Act.
Addition of 3 frontier agents, a new class of AI agents that work as an extension of your software development team
Frontier agents represent a step-change in what agents can do. They’re autonomous, scalable, and can work for hours or days without intervention. AWS announced three frontier agents—Kiro autonomous agent, AWS Security Agent, and AWS DevOps Agent. Kiro autonomous agent acts as a virtual developer for your team, AWS Security Agent is your own security consultant, and AWS DevOps Agent is your on-call operational team.
Companies, including Commonwealth Bank of Australia, SmugMug, and Wester Governors University have used one or more of these agents to transform the software development lifecycle.
Unveiling Trainium3 UltraServers
As AI models grow in size and complexity, training cutting-edge models requires infrastructure investments that only a handful of organizations can afford.
Amazon EC2 Trn3 UltraServers, powered by AWS’s first 3nm AI chip, pack up to 144 Trainium3 chips into a single integrated system, delivering up to 4.4x more compute performance and 4x greater energy efficiency than Trainium2 UltraServers.
Customers achieve 3x higher throughput per chip while delivering 4x faster response times, reducing training times from months to weeks. Customers including Anthropic, Karakuri, Metagenomi, NetoAI, Ricoh, and Splash Music are reducing training and inference costs by up to 50 per cent with Trainium, while Decart is achieving 4x faster inference for real-time generative video at half the cost of GPUs, and Amazon Bedrock is already serving production workloads on Trainium3.
Technology
NITDA Alerts Nigerians to ChatGPT Vulnerabilities
By Adedapo Adesanya
The National Information Technology Development Agency (NITDA) has issued an advisory on new vulnerabilities in ChatGPT that could expose users to data-leakage attacks.
According to the advisory, researchers discovered seven vulnerabilities affecting GPT-4o and GPT-5 models that allow attackers to manipulate ChatGPT through indirect prompt injection.
The agency explained that hidden instructions placed inside webpages, comments, or Uniform Resource Locators (URLs) can trigger unintended commands during regular browsing, summarisation, or search actions.
“By embedding hidden instructions in webpages, comments, or crafted URLs, attackers can cause ChatGPT to execute unintended commands simply through normal browsing, summarization, or search actions,” they stated.
The warning followed rising concerns about AI-powered tools interacting with unsafe web content and the growing dependence on ChatGPT for business, research, and public-sector tasks.
NITDA added that some flaws allow the bypassing of safety controls by masking malicious content behind trusted domains.
Other weaknesses take advantage of markdown rendering bugs, enabling hidden instructions to pass undetected.
It explained that in severe cases, attackers can poison ChatGPT’s memory, forcing the system to retain malicious instructions that influence future conversations
They stated that while OpenAI has fixed parts of the issue, Large-Language Models (LLMs) still struggle to reliably separate genuine user intent from malicious data.
The Agency warned that these vulnerabilities could lead to a range of cybersecurity threats, including unauthorised actions carried out by the model; unintended exposure of user information; manipulated or misleading outputs; and long-term behavioural changes caused by memory poisoning, among others.
It advised Nigerians, businesses, and government institutions to adopt several precautionary steps to stay safe. These include limiting or disabling the browsing and summarisation of untrusted websites within enterprise environments and enabling features like browsing or memory only when necessary.
It also recommended regular updates to deployed GPT-4o and GPT-5 models to ensure known vulnerabilities are patched.
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism9 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking7 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn











