Technology
How Businesses Can Prevent and Combat Cyber Threats
By Otori Emmanuel
Online business may have its benefits, but there is also a greater chance of hoaxes and cyber threats. The credibility of your business could be negatively affected by a successful cyber-attack. Therefore, safeguarding your business against cyber-attack is a crucial concern. That, if not prevented, may require a re-establishment of the business.
In extreme scenarios, it may even force you out of business permanently because you won’t be able to make up the lost revenue and customer loyalty, as clients want to feel safe in transactions. The good news is that you may take preventative action and safeguard your company before it’s too late by choosing from a selection of cyber insurance alternatives.
Preventive measures against cyber threats
- Installation of Devices and Network Security Software
Verify that your operating system and security applications are set to update automatically. Updates might include vital security upgrades for recent malware and threats. Most updates allow you to schedule them at a time that is more convenient for you, typically after office hours. It’s imperative to consistently follow update prompts since updates frequently fix serious security issues. Install security software to help prevent infection on business PCs and mobile devices. To prevent compromise on business laptops, desktops, and mobile devices, the software should have anti-virus, anti-spyware, and anti-spam filters. Setting up a firewall between your working devices and the internet acts as a gatekeeper for traffic entering and leaving. Maintain a robust firewall by regularly updating to the newest patches.
- Passphrase use and setting up several authenticators
If possible, take extra precautions to make your security more difficult to access because you do not want to lose your company to hackers. Instead of using passwords, use passphrases to secure your networks and devices that house sensitive company data. Passphrases are phrases or collections of words that are used as passwords. Humans find them easy to memorize, but computers find them challenging to decipher. A secure passphrase needs to be at least 14 characters long and includes a mix of capital and lowercase letters, digits, and special characters. For each of your accounts, use a different passphrase. If you are serious about protecting your company, changing passwords to passphrases is insufficient. To ensure that the legitimate owners are granting access, multi-factor authentication (MFA) is used in this situation. Before you can access your account, two or more forms of identification must be shown. Additional security for your accounts is provided by two-factor or multi-factor authentication.
- Protect sensitive information
The data that will be sent into and out of your company system needs to be encrypted after you’ve configured your authenticators. Before sending your data over the internet, encryption transforms it into a hidden code. Make sure your network encryption is enabled and that all data received or stored online is encrypted. This lowers the danger of theft, destruction, or tampering by limiting data access to parties that possess the encryption key. When utilizing a public network, you can enable network encryption by adjusting the settings on your router or by setting up a virtual private network (VPN) program on your computer.
- Backup your data
Data backup is one of the cheapest ways to guarantee that your information can be retrieved in the event of a cyber-incident or computer issue. Additionally, it is a less demanding technique to prevent future attacks. Although firewalls, antivirus software, and other security measures may malfunction, keeping a backup provides you with an advantage over attackers. To assist ensure the protection of your data, use a range of backup techniques, like routine incremental backups to a mobile device or cloud storage. Include weekly, quarterly, and yearly server backups as well. It should be regularly checked to see if this data is functioning properly and can be recovered. Store several copies of your backup offline, if possible.
- Your business’s safety is your employees’ safety
Your staff and device operators are responsible for your company’s security. Businesses should have clear cyber security policies that inform staff on what is appropriate while sharing data, using computers and other devices, and visiting websites. Your personnel should receive internet safety instructions making them aware of the dangers they can encounter and their responsibility for keeping your company safe. Hackers might have their access restricted by creating a culture of awareness. This is why it is so important to teach them how to recognize, avoid, and handle a cyber-attack and use strong passwords and passphrases.
Keep track of all the computing hardware and applications that your company employs. All the hardware and software that your company employs must be documented. Any software and hardware that are no longer in use should be disconnected from the network, and sensitive data should be deleted. Older, inactive hardware and software won’t likely be updated, and they could be exploited as a “backdoor” by thieves to attack companies. In a similar vein, you ought to deny access to former workers and people who have switched roles and no longer need it.
- Business continuity is based on customers’ safety
It’s crucial that you protect the information about your clients. Your company’s reputation will suffer if you misplace or compromise their information, and you risk legal repercussions. Make sure your company invests in a safe online transaction environment and protects any stored personal customer data. Find out what your payment gateway provider can do to stop online payment fraud if you accept payments online. Consider purchasing cyber insurance to safeguard your company. Dealing with a cyber-attack may cost far more than simply replacing computers, enhancing security, or repairing databases. Your company may benefit from the cost savings provided by cyber liability insurance coverage for attack recovery.
Technology
Meta Strengthens Teen Safety Online
By Modupe Gbadeyanka
The parent company of Facebook, WhatsApp, and Instagram, Meta, has strengthened its teen safety online with an expansion of its AI-powered age assurance measures.
This is part of efforts to create safer, age-appropriate experiences for young people across its platforms. Through a combination of AI, product design, and parental support tools, Meta continues to strengthen how it identifies teens, protects them by default, and supports families in navigating digital environments.
Strengthening underage enforcement with advanced AI
Meta requires users to be at least 13 years old to use its platforms and continues to invest in advanced technologies to uphold this policy at scale. As part of these efforts, the company is further enhancing its AI-driven systems to more effectively identify and take action on accounts that may belong to underage users.
These advancements include:
Contextual AI analysis across profiles: Meta’s systems analyse a wide range of signals—including posts, comments, bios and captions—to identify contextual indicators such as references to school environments or age-related milestones. This capability is being expanded across additional surfaces within Meta’s apps, strengthening enforcement more consistently and proactively.
Advanced visual analysis technology: Meta is introducing AI that can interpret general age-related cues within photos and videos. This technology estimates age ranges based on broad characteristics and does not use facial recognition or identify individuals. When combined with behavioural and textual signals, it significantly enhances detection accuracy.
Expanded enforcement and verification processes: Accounts identified as potentially underage are subject to age verification requirements. Where age cannot be confirmed, accounts may be removed to maintain platform integrity.
Improved reporting and flagging tools: Meta is making it easier for people to report suspected underage accounts through simplified reporting flows available both in-app and via the Help Centre, helping surface potential violations more efficiently.
AI-supported review systems: To improve consistency and speed, Meta is supplementing human review teams with AI models that apply standardised evaluation criteria to reports, enabling faster and more reliable enforcement outcomes.
Stronger circumvention safeguards: Meta is also enhancing its ability to detect and prevent repeat attempts by users who may try to bypass age restrictions by creating new accounts.
While many of these AI-driven systems are already in use globally, certain advanced capabilities continue to be rolled out progressively across additional markets.
Expanding Teen Account protections
Meta continues to expand its Teen Account framework, which is designed to provide built-in protections that limit unwanted contact and reduce exposure to inappropriate content. Since its introduction, hundreds of millions of teens have been enrolled in these protections across Instagram, Facebook, and Messenger.
These protections include automatically placing teens under 18 into age-appropriate experiences, including a default 13+ content setting designed to limit exposure to sensitive content.
Building on this progress, Meta is further scaling its proactive detection technology that identifies users who may be teens—even if they have entered an adult birthdate—and automatically places them into age-appropriate settings. This technology, already rolled out in several markets, is being expanded to additional regions to make these protections available more broadly over time.
Supporting parents with tools and guidance
Meta continues to support parents as key partners in helping teens navigate online experiences safely. The company is introducing new notifications and guidance designed to help parents better understand how to verify their teen’s age and encourage open conversations about the importance of providing accurate information online.
These efforts build on existing resources available through Meta’s Family Centre, which provides tools and educational materials to help families manage their digital experiences more effectively.
Meta also maintains age verification requirements for users who attempt to change their age in ways that may bypass protections, using a combination of ID verification and facial age estimation tools.
Advocating for industry-wide solutions
Meta continues to emphasise that age assurance is a complex, industry-wide challenge that requires broader collaboration. The company supports approaches where age verification is conducted at the operating system or app store level, enabling developers to deliver consistent, age-appropriate experiences across apps.
In addition to AI-based detection, Meta uses age estimation based on user activity and signals, as well as user reports, to help determine whether someone may be misrepresenting their age.
Technology
Interswitch Inducts New Interns into Developer Academy to Fortify Tech Talent Pipeline
By Aduragbemi Omiyale
A cohort of developer interns has been inducted into the Developer Academy of Interswitch as part of efforts to deepen Africa’s tech talent pipeline.
The new cohort emerged through a rigorous multi-stage process involving technical assessments and interviews. They were chosen from over 20,000 applications.
The talents were sourced from across key engineering tracks, including Backend Development, DevOps, Mobile Development, Frontend Engineering, and Quality Assurance.
Their induction highlights both the scale of interest in software engineering opportunities in Nigeria and Interswitch’s role in nurturing the next generation of highly skilled technology professionals.
During the 9-month programme, participants will benefit from mentorship by experienced professionals, exposure to enterprise-grade systems, and the development of workplace readiness skills essential for today’s dynamic work environment.
Designed as an intensive and structured learning experience, the Developer Academy combines theoretical instruction with real-world application, equipping participants with the skills required to thrive in an increasingly global and competitive technology landscape.
At the end of the programme, top-performing interns may be offered full-time roles within Interswitch, while others are well-positioned to pursue opportunities across the broader technology landscape.
“At Interswitch, we have always believed in the capacity to see beyond the immediate challenges and focus on long-term impact. While the migration of skilled talent remains a reality, our approach is to actively shape the outcomes by building a strong and sustainable pipeline of technology professionals,” the chief executive of Interswitch, Mr Mitchell Elegbe, said.
“We are therefore committed to equipping individuals with the capabilities to contribute meaningfully to the broader technology ecosystem, locally and globally, not just for our own needs at Interswitch. In doing so, we are not only strengthening the industry but also reinforcing Nigeria’s position as a source of globally competitive engineering talent,” he added.
Also commenting, the Human Resources Officer, Mr Franklin Ali, said, “The Developer Academy reflects our long-term commitment to building talent at scale. We are equipping these young professionals not just with technical skills, but with the mindset, discipline, and adaptability required to thrive in diverse environments.
“Whether they build their careers within Interswitch, contribute to the local ecosystem, or explore global opportunities, they represent the strength and potential of Nigerian talent and carry forward the standard of excellence we are committed to building.”
Beyond its immediate training objectives, Interswitch’s Developer Academy is anchored on a broader strategic vision, one that addresses the ongoing migration of skilled talent from Nigeria and other developing economies.
As global demand for software engineers continues to rise, many highly skilled professionals are increasingly recruited by international organisations.
Interswitch’s approach reframes this trend, positioning talent development both as a means of local capacity building and as an opportunity to strengthen Nigeria’s reputation as a global hub for technology expertise.
Technology
Flexmobile to Disrupt Nigeria’s Telecom Landscape
By Modupe Gbadeyanka
Nigeria’s telecom landscape is about to be abuzz, with the much-anticipated launch of Flexmobile from Hazon Technologies.
Feelers indicate that the company will soon make a commercial debut, as the regulatory approval is now in the final stage.
It was gathered that the commercial rollout for Flexmobile should be June 1, 2026, as this depends on the authorisation of the Nigerian Communications Commission (NCC), which regulates the sector. The telco will have the distinctive 081 number series.
Early signals suggest a product ecosystem engineered around flexibility, data-centricity, and user control—an approach aligned with the evolving expectations of Nigeria’s digitally connected population.
For seamless operations, Flexmobile has sealed commercial agreements with its MVNE, IMBIL, and Airtel Nigeria.
“What lies ahead is more than a launch—it is the beginning of a new way to experience telecoms in Nigeria,” the chief executive of Hazon Technologies, Mr Victor ‘Gbenga Afolabi, said at a recent media briefing.
“After years of building the right partnerships and infrastructure, we are approaching a defining milestone. Flexmobile is designed to challenge conventions and introduce a smarter, more flexible telecom experience for Nigerians,” he added.
While full details of its offering will be unveiled at launch, Flexmobile is expected to introduce a suite of value-added services designed to go beyond traditional connectivity—positioning the brand at the intersection of telecoms, lifestyle, and digital enablement.
Backed by strong institutional partnerships and a robust MVNE framework, Flexmobile enters the market not just as another operator, but as a platform with the potential to reshape how telecom services are consumed and experienced.
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism10 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking8 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn
