Connect with us

Technology

Phillips Consulting’s Guide to Avoiding Security Complexities

Published

on

Cyber-Security Phillips Consulting

Many years ago, the firewall was everything. Defence-in depth was a concept defined as layered defence with multiple firewalls on the path.

Behind the firewall was a fortress. Organisations designed networks with strong perimeters and demilitarised zones to ensure the crown jewels were well-protected. Attackers had a difficult time trying to break into the firewalls.

On the physical layer, Network Admission Control (NAC) technologies were implemented to prevent intruders from having direct access into the network by preventing them from plugging unauthorised devices into the network. Before a device was admitted, it had to meet a minimum requirement defined by the organisation.

Those years are gone and maybe gone forever. Cloud computing, Bring Your Own Device (BYOD), Artificial Intelligence, Internet of Things (IoT), VPNs and Remote Working Capabilities have dramatically changed the way businesses run.

These technologies have introduced a level of innovation and disruption that were unimaginable only a few years ago. They have resulted in the collapse of the traditional network perimeter, thereby increasing the attack surface for cyber-attacks.

Enterprise networks coverage is today being extended beyond our imagination – outside the traditional datacentres to smartphones, cloud platforms, mobile computers and IoT interfaces without geographical boundaries.

The bad guys now have a plethora of interfaces to launch their attacks on; they do not have to breach the network using traditional social engineering tactics physically.

The recent changes in the work environment occasioned by the COVID-19 have further amplified the extension of network boundaries beyond the traditional datacentres.

Employees work from home with devices and connections into the enterprise networks that were not originally designed for such. Improvised connections were made to allow functionality because the pandemic came without an announcement.

The danger this poses is that some of these end devices were not originally designed with security in mind. Even if security was a consideration, not so much for enterprise data protection. These devices are most of the time not hardened, and their owners may not understand the effects on the overall organisational security posture.

A handful of these devices are installed with default passwords, and most times, these passwords are not changed during or after installation. So, it is easy to guess the password by manual methods or using advanced dictionary or brute force attack methods.

Another risk posed by these endpoints is the lack of security updates and patches. Because they are sometimes not seen to be part of the enterprise network, they are not included in the patch management programme, and their presence introduces high-level vulnerabilities within the enterprise network.

It then becomes easier to utilise malware that could tunnel through the firewall to breach the enterprise network, instead of spending months and years trying to break into the firewall or layers of firewalls.

In recent years, large-scale attacks have been launched using malware by exploiting known vulnerabilities and security gaps on endpoints.

For example, the WannaCry, Petya and another variant of Petya, the NotPetya were employed to launch attacks on enterprise networks through vulnerable endpoints. Another danger with this trend is potential data leakage because these devices are used to either temporarily or permanently store organisational data.

There is also concern about device loss. If these devices are lost, there is a risk of exposing the organisation’s data to unauthorised entities, and that could both result in financial and reputational damage.

These dangers are also expanded by the impact of the COVID 19 pandemic, where organisations made ad-hoc improvisions to support businesses while employees work from home.

As commerce resumes, organisations are beginning to discover some capabilities to support their businesses remotely, and they are also rethinking their business continuity strategies.

For some businesses, this is not just a temporal shift, but a change which has permanently altered the operational procedures of the organisation.

Legacy cybersecurity strategies, techniques and investments will not be enough to mitigate the rising cybersecurity concerns introduced by this new way of working. Protection has gone beyond throwing in uncoordinated technical solutions and efforts.

Organisations need to rethink a new approach for the protection of their assets within the ever-growing complexity both to remain afloat and also to derive commensurate Returns On Security Investments (ROSI). A well-crafted strategy will ensure that cybersecurity efforts are coordinated within the enterprise, without duplication of efforts and resources, which will, in turn, drive down the cost of implementing cybersecurity initiatives.

​To improve security posture, organisations must do the following:

  1. Continuously monitor the devices, applications, and processes running on the network.
  2. Automate security monitoring and mitigation.
  3. Implement systems that are capable of automatic detection, isolation and containment of threats within the network.
  4. Ensure that monitoring covers event data, session data, and historical data on endpoint usages, such as past processes, network connections, and other information.

Another measure organisations should take is reducing complexities. The extension of the network boundaries has not stopped organisations from using existing network solutions to protect the enterprise network.

However, in a bid to ensure the protection of the on-premise infrastructure and the ones beyond the organisational traditional network boundaries, organisations combine existing technologies with new solutions and the resultant effect is an increase in complexity.

To effectively manage security, organisations should put measures in place to ensure a reduction in complexity and enhancing visibility. This can be achieved by unifying all efforts and technologies for managing both on-premise and off-premise infrastructure in a single platform. Beyond technical controls, organisations should develop procedures, standards, and policies for acceptable use of organisational resources.

Technology

Interswitch Inducts New Interns into Developer Academy to Fortify Tech Talent Pipeline

Published

on

Interswitch’s Developer Academy

By Aduragbemi Omiyale

A cohort of developer interns has been inducted into the Developer Academy of Interswitch as part of efforts to deepen Africa’s tech talent pipeline.

The new cohort emerged through a rigorous multi-stage process involving technical assessments and interviews. They were chosen from over 20,000 applications.

The talents were sourced from across key engineering tracks, including Backend Development, DevOps, Mobile Development, Frontend Engineering, and Quality Assurance.

Their induction highlights both the scale of interest in software engineering opportunities in Nigeria and Interswitch’s role in nurturing the next generation of highly skilled technology professionals.

During the 9-month programme, participants will benefit from mentorship by experienced professionals, exposure to enterprise-grade systems, and the development of workplace readiness skills essential for today’s dynamic work environment.

Designed as an intensive and structured learning experience, the Developer Academy combines theoretical instruction with real-world application, equipping participants with the skills required to thrive in an increasingly global and competitive technology landscape.

At the end of the programme, top-performing interns may be offered full-time roles within Interswitch, while others are well-positioned to pursue opportunities across the broader technology landscape.

“At Interswitch, we have always believed in the capacity to see beyond the immediate challenges and focus on long-term impact. While the migration of skilled talent remains a reality, our approach is to actively shape the outcomes by building a strong and sustainable pipeline of technology professionals,” the chief executive of Interswitch, Mr Mitchell Elegbe, said.

“We are therefore committed to equipping individuals with the capabilities to contribute meaningfully to the broader technology ecosystem, locally and globally, not just for our own needs at Interswitch. In doing so, we are not only strengthening the industry but also reinforcing Nigeria’s position as a source of globally competitive engineering talent,” he added.

Also commenting, the Human Resources Officer, Mr Franklin Ali, said, “The Developer Academy reflects our long-term commitment to building talent at scale. We are equipping these young professionals not just with technical skills, but with the mindset, discipline, and adaptability required to thrive in diverse environments.

“Whether they build their careers within Interswitch, contribute to the local ecosystem, or explore global opportunities, they represent the strength and potential of Nigerian talent and carry forward the standard of excellence we are committed to building.”

Beyond its immediate training objectives, Interswitch’s Developer Academy is anchored on a broader strategic vision, one that addresses the ongoing migration of skilled talent from Nigeria and other developing economies.

As global demand for software engineers continues to rise, many highly skilled professionals are increasingly recruited by international organisations.

Interswitch’s approach reframes this trend, positioning talent development both as a means of local capacity building and as an opportunity to strengthen Nigeria’s reputation as a global hub for technology expertise.

Continue Reading

Technology

Flexmobile to Disrupt Nigeria’s Telecom Landscape

Published

on

Flexmobile

By Modupe Gbadeyanka

Nigeria’s telecom landscape is about to be abuzz, with the much-anticipated launch of Flexmobile from Hazon Technologies.

Feelers indicate that the company will soon make a commercial debut, as the regulatory approval is now in the final stage.

It was gathered that the commercial rollout for Flexmobile should be June 1, 2026, as this depends on the authorisation of the Nigerian Communications Commission (NCC), which regulates the sector. The telco will have the distinctive 081 number series.

Early signals suggest a product ecosystem engineered around flexibility, data-centricity, and user control—an approach aligned with the evolving expectations of Nigeria’s digitally connected population.

For seamless operations, Flexmobile has sealed commercial agreements with its MVNE, IMBIL, and Airtel Nigeria.

“What lies ahead is more than a launch—it is the beginning of a new way to experience telecoms in Nigeria,” the chief executive of Hazon Technologies, Mr Victor ‘Gbenga Afolabi, said at a recent media briefing.

“After years of building the right partnerships and infrastructure, we are approaching a defining milestone. Flexmobile is designed to challenge conventions and introduce a smarter, more flexible telecom experience for Nigerians,” he added.

While full details of its offering will be unveiled at launch, Flexmobile is expected to introduce a suite of value-added services designed to go beyond traditional connectivity—positioning the brand at the intersection of telecoms, lifestyle, and digital enablement.

Backed by strong institutional partnerships and a robust MVNE framework, Flexmobile enters the market not just as another operator, but as a platform with the potential to reshape how telecom services are consumed and experienced.

Continue Reading

Technology

ipNX, NCC to Drive Inclusive Digital Growth Across Nigeria

Published

on

ipNX Nigeria NCC

By Aduragbemi Omiyale

A leading Information and Communications Technology (ICT) company, ipNX Nigeria, is joining forces with the Nigerian Communications Commission (NCC) to accelerate broadband penetration and drive inclusive digital growth across the country.

Recently, an executive delegation of the organisation paid a visit to the chairman of the regulatory agency, Mr Idris Olorunimbe.

“We are pleased to engage with the new chairman of the NCC and show our support as he takes on this important role.

“Strong leadership and a clear policy direction are essential to unlocking the full potential of Nigeria’s digital economy.

“At ipNX, we remain committed to working closely with the commission and other stakeholders to expand broadband access, enhance connectivity in educational institutions, and ultimately bridge the digital divide.

“This collaboration will empower millions of Nigerians and further position the country as a leader in Africa’s technological evolution,” the Managing Director of ipNX Nigeria, Mr Ejovi Aror, said at the visit.

In his remarks, Mr Olorunnimbe thanked the firm for the show of support, reiterating the commission’s commitment to fostering an enabling environment for private sector participation in achieving universal broadband access across Nigeria.

This collaboration is expected to advance Nigeria’s transformation agenda in technology and help boost the federal government’s broadband agenda for the country.

ipNX Nigeria has said it remains at the forefront of delivering cutting-edge broadband and ICT solutions, and this engagement underscores its unwavering dedication to supporting national development through technology-driven initiatives.

Continue Reading

Trending