Connect with us

Technology

Phillips Consulting’s Guide to Avoiding Security Complexities

Published

on

Cyber-Security Phillips Consulting

Many years ago, the firewall was everything. Defence-in depth was a concept defined as layered defence with multiple firewalls on the path.

Behind the firewall was a fortress. Organisations designed networks with strong perimeters and demilitarised zones to ensure the crown jewels were well-protected. Attackers had a difficult time trying to break into the firewalls.

On the physical layer, Network Admission Control (NAC) technologies were implemented to prevent intruders from having direct access into the network by preventing them from plugging unauthorised devices into the network. Before a device was admitted, it had to meet a minimum requirement defined by the organisation.

Those years are gone and maybe gone forever. Cloud computing, Bring Your Own Device (BYOD), Artificial Intelligence, Internet of Things (IoT), VPNs and Remote Working Capabilities have dramatically changed the way businesses run.

These technologies have introduced a level of innovation and disruption that were unimaginable only a few years ago. They have resulted in the collapse of the traditional network perimeter, thereby increasing the attack surface for cyber-attacks.

Enterprise networks coverage is today being extended beyond our imagination – outside the traditional datacentres to smartphones, cloud platforms, mobile computers and IoT interfaces without geographical boundaries.

The bad guys now have a plethora of interfaces to launch their attacks on; they do not have to breach the network using traditional social engineering tactics physically.

The recent changes in the work environment occasioned by the COVID-19 have further amplified the extension of network boundaries beyond the traditional datacentres.

Employees work from home with devices and connections into the enterprise networks that were not originally designed for such. Improvised connections were made to allow functionality because the pandemic came without an announcement.

The danger this poses is that some of these end devices were not originally designed with security in mind. Even if security was a consideration, not so much for enterprise data protection. These devices are most of the time not hardened, and their owners may not understand the effects on the overall organisational security posture.

A handful of these devices are installed with default passwords, and most times, these passwords are not changed during or after installation. So, it is easy to guess the password by manual methods or using advanced dictionary or brute force attack methods.

Another risk posed by these endpoints is the lack of security updates and patches. Because they are sometimes not seen to be part of the enterprise network, they are not included in the patch management programme, and their presence introduces high-level vulnerabilities within the enterprise network.

It then becomes easier to utilise malware that could tunnel through the firewall to breach the enterprise network, instead of spending months and years trying to break into the firewall or layers of firewalls.

In recent years, large-scale attacks have been launched using malware by exploiting known vulnerabilities and security gaps on endpoints.

For example, the WannaCry, Petya and another variant of Petya, the NotPetya were employed to launch attacks on enterprise networks through vulnerable endpoints. Another danger with this trend is potential data leakage because these devices are used to either temporarily or permanently store organisational data.

There is also concern about device loss. If these devices are lost, there is a risk of exposing the organisation’s data to unauthorised entities, and that could both result in financial and reputational damage.

These dangers are also expanded by the impact of the COVID 19 pandemic, where organisations made ad-hoc improvisions to support businesses while employees work from home.

As commerce resumes, organisations are beginning to discover some capabilities to support their businesses remotely, and they are also rethinking their business continuity strategies.

For some businesses, this is not just a temporal shift, but a change which has permanently altered the operational procedures of the organisation.

Legacy cybersecurity strategies, techniques and investments will not be enough to mitigate the rising cybersecurity concerns introduced by this new way of working. Protection has gone beyond throwing in uncoordinated technical solutions and efforts.

Organisations need to rethink a new approach for the protection of their assets within the ever-growing complexity both to remain afloat and also to derive commensurate Returns On Security Investments (ROSI). A well-crafted strategy will ensure that cybersecurity efforts are coordinated within the enterprise, without duplication of efforts and resources, which will, in turn, drive down the cost of implementing cybersecurity initiatives.

​To improve security posture, organisations must do the following:

  1. Continuously monitor the devices, applications, and processes running on the network.
  2. Automate security monitoring and mitigation.
  3. Implement systems that are capable of automatic detection, isolation and containment of threats within the network.
  4. Ensure that monitoring covers event data, session data, and historical data on endpoint usages, such as past processes, network connections, and other information.

Another measure organisations should take is reducing complexities. The extension of the network boundaries has not stopped organisations from using existing network solutions to protect the enterprise network.

However, in a bid to ensure the protection of the on-premise infrastructure and the ones beyond the organisational traditional network boundaries, organisations combine existing technologies with new solutions and the resultant effect is an increase in complexity.

To effectively manage security, organisations should put measures in place to ensure a reduction in complexity and enhancing visibility. This can be achieved by unifying all efforts and technologies for managing both on-premise and off-premise infrastructure in a single platform. Beyond technical controls, organisations should develop procedures, standards, and policies for acceptable use of organisational resources.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

PIAFo Leads Urgent Push for National Dig-Once Policy

Published

on

PIAFo 2026

Key players across Nigeria’s digital economy, telecommunications, and infrastructure ecosystem are set for the National Dig-Once Policy Forum to champion a new course towards increasing Nigeria’s digital backbone network to 125,000km of fibre-optic infrastructure.

The event, which marks the 8th edition of Policy Implementation Assisted Forum (PIAFo), is a high-level industry dialogue aimed at accelerating the formulation and adoption of a National Dig-Once Policy as a critical enabler of safe, coordinated and cost-effective fibre infrastructure deployment in the country.

The forum, themed Accelerating Nigeria’s Digital Backbone: Dig Once Policy, Project BRIDGE and Strategies for Effective Fibre Deployment, is slated for Thursday, April 16, 2026, at Radisson Blu Hotel, Ikeja GRA, Lagos.

According to the organisers, Business Metrics Limited (BML), the introduction of the $2 billion Project BRIDGE initiative by the Federal Government to expand fibre infrastructure by an additional 90,000km from 35,000km to 125,000km by 2030 requires some new measures to ensure the successful implementation of the ambitious target and avoid mistakes of the past.

Industry stakeholders have identified that the success of a national connectivity backbone rollout depends largely on institutionalising a Dig Once Policy framework, which encourages the installation of fibre ducts and conduits whenever roads, railways, and other major public infrastructure are being constructed or rehabilitated.

According to industry data shared by the Nigerian Communications Commission, lack of such a framework is taking a toll on the telecoms sector and broadband drive as operators recorded over 50,000 fibre cut incidents across the country in 2024, with more than 60 per cent occurring during road construction and rehabilitation activities. These disruptions have resulted in billions of naira in repair costs, network outages, and service degradation.

Telecom operators in Lagos State alone said they spent over N5 billion in 2024 to repair and replace damaged fibre infrastructure in the state, while lamenting that the development continues to slow down network upgrade and expansion drive.

Beyond infrastructure damage, telecom operators also face challenges such as high Right of Way (RoW) charges, uncoordinated civil works, and repeated excavation of roads for fibre deployment.

PIAFo 8.0 aims to address these challenges by fostering collaboration among stakeholders responsible for planning, financing, constructing, and maintaining Nigeria’s digital infrastructure.

Specifically, the forum seeks to align federal, state, and local infrastructure planning around a unified Dig-Once framework; strengthen collaboration between telecom operators, infrastructure companies, and public works authorities; translate policy intentions into actionable guidelines and implementation timelines; and build stakeholder support for Project BRIDGE and complementary national fibre initiatives.

Speaking about the event, Team Lead at Business Metrics Limited, Omobayo Azeez, said Nigeria is being denied access to the robust connectivity it should derive from up to eight high-capacity undersea cable networks landed on its shores because of difficulties around terrestrial fibre infrastructure expansion.

“The Project BRIDGE initiative should excite everyone because of its ambitious targets. But for those who understand the operating terrain and why it took the industry over 20 years to achieve around 35,000km of fibre network that the country currently operates for broadband connectivity, the project calls for a major shift in execution approach with the adoption of a National Dig-Once Policy as the starting point.

“PIAFo, now in its 8th edition, is again serving as the viable platform for representatives from government ministries and agencies, senior telecom executives, infrastructure companies, data centre operators, equipment manufacturers, state governments, and industry associations to chart the way forward.”

The forum will feature keynote addresses, expert panel discussions, and strategic networking sessions designed to drive pragmatic outcomes that will accelerate Nigeria’s journey toward a resilient and inclusive digital economy.

Continue Reading

Technology

Nigeria, Finland Strengthen Ties on Digital Economy

Published

on

Digital Economy Policy

By Adedapo Adesanya

The Nigerian government and the Republic of Finland have formalised a strategic partnership on digitalisation and innovation, signing a Memorandum of Understanding (MoU) aimed at expanding economic activities and strengthening cooperation in the digital sector.

The agreement was signed in Abuja by the Minister of Communications, Innovation and Digital Economy, Mr Bosun Tijani, and Mr Jarno Syrjälä, Under‑Secretary of State (International Trade) at Finland’s Ministry for Foreign Affairs.

According to a statement from the Special Assistant on Media and Communications to the communications minister, Mr Isime Esene, the MoU will establish a framework for collaboration across key areas, including digital government, emerging technologies, digital public infrastructure, cybersecurity, innovation ecosystems, and capacity building.

Mr Tijani described the signing as “an important step in strengthening the partnership between both countries as we work to build a more inclusive, innovation-driven digital economy.”

“This agreement is a significant next step following our engagements in Helsinki in February, where we met with key stakeholders, including Finnvera and Finnfund, and held productive discussions on advancing collaboration around digital infrastructure, the Data Exchange Platform, and opportunities for Finnish participation in Project Bridge.”

The Minister emphasised that the partnership would “unlock meaningful opportunities for both countries, enabling us to leverage digital transformation as a catalyst for sustainable growth and shared prosperity.”

Echoing this optimism, Mr Syrjälä said: “Finland is very pleased to deepen its partnership with Nigeria in building resilient, secure, and human‑centric digital societies. Digitalisation is at its best when it empowers people, strengthens trust, and creates new opportunities for innovation.”

“Nigeria is a key partner for Finland in Africa, and this MoU provides a strong basis for concrete cooperation between our governments, institutions, and private sectors. Together, we can advance digital solutions that are interoperable, future‑fit, and beneficial to both our nations,” he added.

Continue Reading

Technology

Meta Launches AI Support Assistant on Facebook, Instagram

Published

on

Meta AI Support Assistant

By Aduragbemi Omiyale

New Artificial Intelligence (AI) tools designed to provide support for users of its applications have been launched by Meta.

The AI Support Assistant will work on the Facebook and Instagram apps, the company said in a statement.

The tools will help users to receive reliable and action-oriented assistance when needed.

In December, the Meta AI support assistant, a tool designed to provide reliable, 24/7 support for nearly any support issue at any time, was previewed.

Now, Meta is rolling it out globally on the Facebook and Instagram apps for iOS and Android, and within Help Centre on Facebook and Instagram on desktop, with even more capabilities and ways to help.

The new Meta AI support assistant is designed to help resolve account problems from start to finish. It offers answers for any question, like notification settings or new features, and can also take action for users on a growing set of requests directly within Facebook and, in the future, on Instagram.

The feature can report scams, impersonation accounts, or problematic content, make it easier to see why content was taken down, provide appeal options, track what happens next, manage privacy settings, reset passwords, and update profile settings.

The Meta AI support assistant can respond to requests typically in under five seconds, dramatically reducing wait times compared to traditional help centre searches or seeking answers on external websites.

“The Meta AI support assistant is a major step in our work to deliver stronger support on our apps. In fact, among people who have provided feedback, the majority report a positive experience with the Meta AI support assistant. It’s rolling out now in all languages supported by Facebook and Instagram for support topics.

“We’re continuing to invest in AI- powered tools to make support more accessible, reliable, and effective — and we’ll keep evolving the Meta AI support assistant as more people use it and as the technology advances, so it continues to improve over time,” the organisation disclosed.

Meta has also deployed AI to improve content enforcement to help users reduce the chance that scammers trick people into giving away their login details, ultimately finding and mitigating 5,000 scam attempts per day that no existing review team had caught before.

Meta said over the next few years, it would be deploying these more advanced AI systems across its apps once they consistently perform better than its current methods of content enforcement, transforming its approach.

“As we do this, we’ll reduce our reliance on third-party vendors for content enforcement and focus on strengthening our internal systems and workforce.

“While we’ll still have people who review content, these systems will be able to take on work that’s better-suited to technology, like repetitive reviews of graphic content or areas where adversarial actors are constantly changing their tactics, such as with illicit drug sales or scams,” it stated.

Continue Reading

Trending