Connect with us

Technology

Nigerian Businesses Pay $706,452 as Cyber Ransom—Report

Published

on

Nigerian businesses cyber ransom

By Adedapo Adesanya

A new report has shown that amid a drive for digitalization, a total of $706,452 has been paid in ransom to cybercriminals by Nigerian businesses.

According to Sophos, in The State of Ransomware 2022 report, Industrial Control Safety Systems (ICSS) in critical infrastructure are increasingly exposed to cyber-attacks because of the digitization drive of the industry.

The report showed that as supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control systems become connected to the Internet to allow greater business efficiency (remote process monitoring, system maintenance, process control, and production data analysis)-Industry 4.0, they also make the business more vulnerable to threats with the potential to seriously affect critical Industrial Control and Safety Systems.

Exposing the need as to as why internal cybersecurity is the new normal, the note shared with Business Post showed that critical infrastructure is classified as the physical and IT/OT assets, networks, and services. And that, if disrupted or destroyed, would have a serious impact on the health/ security/economic well-being of citizens and the efficient functioning of a country’s government.

“The energy sector and manufacturing industries are critical to the global economy, and their security is of the utmost importance. The integration of operational technology (OT) and information technology (IT) – industry 4.0 – in these industries has also increased efficiency and productivity, but it has also increased the risk of cyber-attacks,” the report explained.

“One of the main challenges facing these industries is the integration of OT and IT systems. OT systems, such as control systems, are used to control and monitor physical processes, while IT environments, i.e., the internet and cloud, are used to process and store data. The integration of these environments means that cyber-attacks on the Information Technology environment can now directly impact the physical processes controlled by Operational Technology systems.”

The note explained that the use of legacy (ICSS) in these industries is prevalent as many control & safety systems were developed before cyber security was a global concern and may not have the necessary security measures in place to prevent such attacks when the ICSS is compromised.

In addition, the hardware and software in these legacy ICSS could have reached their End of Life (EOL), which makes them more vulnerable to cyber attackers.

Some other factors have contributed to the growing vulnerability of industrial control systems, which include – insecure remote connections; Access links such as dial-up modems and wireless communications are used for remote diagnostics, maintenance, and examination of system status. If encryption or authentication mechanisms are not utilized, the integrity of the transmitted information is vulnerable.

Another is standardized technologies as organisations are transitioning to technologies, such as Microsoft’s Windows, to reduce costs and improve system scalability and Internal performance. The result is unrestricted access to knowledge and tools to jeopardize the system and an increase in the number of systems vulnerable to attack.

Another critical one is the availability of technical information—public information about infrastructures and control systems is readily available to potential hackers and intruders. Design and maintenance documents and technical standards for a critical system can all be found on the internet, greatly jeopardizing overall security.

In addition to the challenges and vulnerabilities facing the industrial control system, cyber threats and incidents are now major operating and business risks for every digital enterprise.

The report noted that in the age of digitization, it is imperative to create and execute strategies that allow the business to monitor and mitigate cyber threats and risks supporting its financial objectives.

However, to truly mitigate these risks and be IIOT-ready, organisations need to “have a comprehensive cyber security program with the partnership of industry experts, which incorporates intrusion detection and prevention systems, firewalls and secure remote access solutions in place, such as those offered by Schneider Electric; with a team of certified experts, delivering holistic cybersecurity programs to help maintain the system’s defences, with cybersecurity services such as vulnerability assessments, penetration testing, and incident response planning from an operations perspective, while integrating appropriate IT policies and requirements.”

The report warned that while the integration of OT and IT systems in the energy sector and manufacturing industries has increased efficiency and productivity, it has also increased the risk of cyberattacks.

To remedy this, organisations in these industries were tasked to adopt a cyber security program and posture to maintain profitability to protect against cyber-attacks.

Adedapo Adesanya is a journalist, polymath, and connoisseur of everything art. When he is not writing, he has his nose buried in one of the many books or articles he has bookmarked or simply listening to good music with a bottle of beer or wine. He supports the greatest club in the world, Manchester United F.C.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Facebook Offers New Tools to Report Impersonation, Removes 20 million Accounts

Published

on

Facebook Original content creators

By Modupe Gbadeyanka

As part of its commitment to celebrating and rewarding creativity, Facebook has updated its guidance, with clear definitions of what counts as original and unoriginal content.

In a message on Monday, the social media platform said it was offering content creators new tools to report impersonation.

Launched last year, the content protection tool is expanding beyond detecting reel matches across Meta platforms to now also flag potential impersonation.

Creators can take action on content theft and easily submit impersonation reports all in one place.

Facebook, in the statement received by Business Post, said creators can check for access to content protection in their professional dashboard or apply for access here.

The platform also disclosed that in 2025, it removed over 20 million accounts impersonating large content creators, and impersonation reports related to large content creators dropped by 33 per cent.

Further, Facebook is deprioritising unoriginal content by making sure they do not perform well on its platform.

It noted that content that is duplicated from other sources or makes low-value changes to someone else’s content may see significantly reduced reach, and accounts that primarily post unoriginal content may lose eligibility for recommendations and monetisation.

It was emphasised that “these changes provide creators who post original content with greater reach and monetisation opportunities, provide stronger protections for their work, and reduce the reach of unoriginal content.”

Continue Reading

Technology

Genetec Sets New Standard for Enterprise Physical Security with Cloudlink 2210

Published

on

Genetec Cloudlink 2210

By Dipo Olowookere

A new high-density appliance that enables enterprises to scale cloud-managed physical security without forcing cloud-only storage or infrastructure replacement has been launched by a global leader in enterprise physical security software, Genetec.

The product, Cloudlink 2210, was designed for complex, enterprise-scale deployments and supports multiple workloads, including video management, access control, and intrusion detection, in a single appliance. By consolidating these workloads into one appliance, it reduces system sprawl, simplifies management in large-scale environments, and lowers operational overhead.

Unlike solutions that separate workloads across multiple proprietary systems, Genetec Cloudlink 2210 is built on an open architecture that supports a wide range of third-party devices, including cameras, access control systems, and intrusion panels. This enables organisations to modernise at scale within a unified, cloud-managed model designed to preserve architectural flexibility, while securely integrating existing hardware, maintaining business continuity, and reducing migration risks.

The company disclosed that Cloudlink 2210 also supports hundreds of connected devices per appliance and provides up to 240 TB of local storage per unit, making it well-suited for deployments with high device density and long retention policies. The Cloudlink 2210 is ideal for enterprise environments where uptime and local retention requirements are operational priorities because its design minimises dependence on cloud storage, helping organisations control long-term storage costs while maintaining the performance and availability required in enterprise environments.

The new product also incorporates hardware-level resiliency to support strict uptime and retention requirements. RAID-protected storage and redundant system components help ensure data protection and OS availability. Security workloads continue operating locally, independent of cloud connectivity, allowing deployments to maintain continuity even during network disruptions. Dual network interfaces provide redundancy and support network isolation to strengthen cybersecurity.

It scales by adding units as requirements grow, enabling organisations to increase device counts and storage capacity without redesigning their infrastructure. Centralised cloud management maintains visibility and control across deployments.

Genetec Cloudlink 2210 is part of the broader Genetec approach to deployment flexibility.  The cloud-managed appliance portfolio enables organisations to operate on premises, in the cloud, or across hybrid environments based on their operational and regulatory requirements. By combining high-performance local processing and storage with centralised cloud operations and management, Cloudlink 2210 supports scalable, cloud-managed deployments without compromising control or performance.

The Product Director for Unified Solutions at Genetec Incorporated, Mr Christian Chenard Lemire, said, “Enterprises don’t want to choose between innovation and operational certainty.

“With Cloudlink 2210, we’re redefining what cloud-managed physical security looks like at scale by giving organisations the freedom to modernise on their own terms, control long-term costs, and maintain the resiliency and continuity their most critical environments demand.”

Continue Reading

Technology

TikTok Invests Fresh $200K in AI Media Literacy in Africa

Published

on

TikTok AI Media Literacy Tokunbo Ibrahim

By Modupe Gbadeyanka

An additional $200,000 will be invested in Artificial Intelligence (AI) media literacy initiatives across Sub-Saharan Africa, TikTok announced during its third annual Sub-Saharan Africa Safer Internet Summit in Nairobi, Kenya.

The platform hosted government officials, regulators, online safety partners and industry leaders for the event, reinforcing its commitment to collaborative approaches to online safety.

The funds will be provided in ad credits to help support local organisations in the region to expand AI media literacy.

This investment builds on the company’s initial $2 million AI Literacy Fund, launched in November 2025, which awarded 20 global non-profits to create content that boosts public understanding of AI.

In Sub-Saharan Africa, TikTok initially supported three organisations to advance digital literacy and combat misinformation.

“With the rapid advancement of AI, we are committed to educating our community online, so they feel empowered to have responsible experiences with AI, whether that’s as viewers or creators.

“We are partnering with trusted local organisations that communities already know and rely on, because their expertise and deep local connections are essential to making AI literacy programs truly impactful,” the Global Head of Partnerships, Elections and Market Integrity at TikTok, Mr Valiant Richey, stated.

Earlier, the Head of Government Relations and Public Policy for Sub-Saharan Africa at TikTok, Ms Tokunbo Ibrahim, said, “As we host the 3rd Annual Safer Internet Summit here in Kenya, our mission is clear: to share learnings, insights, tackle common challenges and collaboratively advance actionable solutions that protect citizens online.

“By bringing together a diverse coalition of policymakers, tech innovators, and creators, we are ensuring that the conversations we have at this Summit are all-inclusive and lead to a more resilient digital landscape.”

The summit featured expert panels and discussions on critical topics, including TikTok’s Trust and Safety efforts, protecting young people online, and policy frameworks for responsible AI governance.

A key highlight of the event was showcasing how TikTok uses AI to transform how people share their creativity and discover new passions, while ensuring the community remains safe through transparent and responsible AI practices.

The platform also shared more about how recent advancements in AI are helping the platform moderate content faster and more consistently at scale, by improving automated moderation and empowering human teams with better moderation tools.

With over 100 million pieces of content uploaded daily to TikTok, these advances, which work alongside human moderation teams, are helping get violative content down faster, reducing the likelihood of the community seeing it.

According to the latest Community Guidelines Enforcement Q3 2025, TikTok removed over 14 million videos across Sub-Saharan Africa, with 96.7 per cent detected and removed proactively using automated technology, underscoring TikTok’s commitment to proactive moderation and swift action.

Continue Reading

Trending