Friday, 23 January 2015

Nigerian Cyber Security Outlook 2015

31,536,000; the number of seconds that made up the year 2014. Around the world, each second was used effectively by hackers in planning attacks and exploiting vulnerable people, systems and processes. Brazen attacks unlike anything we have ever witnessed before were carried out and from all indications, 2015 is likely to be another roller coaster ride.

From the reported hack on the US retail giant (Target), to the Sony pictures entertainment security breach, there is a growing trend in terms of bravado on the part of hackers. In 2014, the National Assembly of Nigeria made a bold move in the war against cybercrime when the Senate passed the Cybercrime Bill. This feat in addition to the cyber security strategy and policy documents introduced by the Office of the National Security Adviser (NSA) are attributes that define 2014 as the year of the awakening.

With each cyber-attack, companies lose millions, trust by consumers get eroded and a trove of confidential information are published. In 2015, we are expecting newspaper front-page headlines to include issues around cyber security incidents. The year will witness an increase in cyber security issues that may likely reduce towards the last quarter. However, the reduction will only be based on a successful implementation of the Bank Verification Number (BVN) and electronic ID by the National Identity Management Committee (NIMC).

Our 2014 cyber security outlook was an eye-opener into the Nigerian cyberspace as all the predictions made were accurate. 2015 must therefore not be underestimated as the seeming deduction is that the hackers are always one step ahead; this is a gap that must be bridged. Based on current events in both social and economic realms in Nigeria, we have reviewed below some of the cyber security trends and threats that are likely to be significant in 2015.

Phishing and insider threats will continue to be biggest cyber threat sources in Nigeria especially as crude oil prices continue to fall:
Phishing is a form of social engineering that attempts to acquire sensitive information such as usernames, passwords, and ATM card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishing is a continual threat that keeps growing to this day. The risk grows even larger in social media such as Facebook, Twitter, Myspace etc.

An Insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have insider information concerning the organization’s security practices, data and computer systems. As companies take austerity measures such as downsizing and salary slashing due to the falling crude oil prices and the devaluation of the naira, there is a higher risk that employees, former employees or contractors result to cybercrime as a means to maintain their standard of living.

We are likely going to see an unprecedented rise in attacks from disgruntled employees. The cybercrime of choice by majority of the Nigerian cyber criminals would be via social engineering. Intelligently crafted phishing emails and phone calls to naïve customers will increase.

Socially and politically motivated cyber-attacks:

With the coming elections in 2015, there may be an increase in the cyber-attack of the websites and information technology (IT) infrastructure of political organisations and public institutions possibly as a means of expressing grievances. Nigeria witnessed a similar occurrence during the socio-political protest movement of January 2012 in response to the fuel subsidy removal by the Federal Government. These attacks could be in form of denial of service attacks and website defacements. Also, there is the potential for increased numbers in local hacker groups to further their agenda by compromising or attacking Government-owned infrastructure. As such, this is a call to all stakeholders concerned to put the necessary security measures in their cyber infrastructure.
Prosecution of cyber related crimes is likely to experience a major boost:

With the passage of the cybercrime bill by the Senate, organisations will now have legal basis for prosecuting cybercrime once it is signed into law. Organizations can put measures in place to track down cyber criminals. We are likely to see more collaboration between organizations in tackling cybercrime as the Central Bank of Nigeria (CBN) drives the Nigerian e-Fraud Forum (NeFF) – where banks meet to share experiences on fraud and mitigating factors. The sharing of cyber security intelligence in the financial sector is expected to grow in 2015 and would serve as a model for other areas of the economy. From the just concluded annual Deloitte Chief Information Security Officer roundtable event in December 2014, there was a recurring theme of cyber security intelligence sharing as a win-win way to tackle cybercrime and be steps ahead of the hacker. This will also boost efforts in tracking and prosecuting cyber criminals.

Outsourcing of Information Security function:

With the shortage of security specialist skills in many companies, the ever-changing threat landscape and the need for 24/7 monitoring and response on certain technological platform especially in Financial Institutions and telecom companies, organizations will need to continually invest more in implementing additional security infrastructure, security training for their personnel and active recruitment for currently skilled professionals. And with prudency in budgeting for organizations, more companies will consider outsourcing their information security function as a more viable option.

Increased compliance costs in non-financial sectors: 

In 2015, we are likely to see new sets of compliance regulations for industries with connection to the financial sector. Though the Central Bank of Nigeria (CBN) has regulated the financial services industry with a variety of compliance rules in 2014, we are likely to see talks or nascent development stages of information security compliance standards for other areas of the economy. There will be an increase in the cost of compliance as regulators may require organizations to comply with new regulations, with repercussions for defaulting. Also with the adoption of the COBIT5 framework by Nigeria, other sectors will soon need to have security policies that align with leading frameworks and standards.

Senior level executives will be held more accountable and possibly fired for security breaches:

We are likely to see executive dismissals as a direct result of security breaches. Senior level executives will be held more accountable and possibly fired for security breaches if adequate measures are not in place. More so, if the brand of an organization suffers to recover in time as a result of a security breach, Chief Information Security Officers and Chief Information Officers will come under serious ‘fire’ from the board and top executives as they struggle to cope with incessant attacks on their networks. According to a report by Gartner, “through 2016, 75% of CISO’s who experience publicly disclosed security breaches and lack documented, tested response plans will be fired.”

The unending battle in cyberspace calls for a more proactive, predictive and robust system that can match tools and techniques used by cyber criminals. Organizations need to ensure they increase vigilance of their assets, learn from previous mistakes and deploy appropriate countermeasures in order to survive in 2015.
I wish you a cyber-secure New Year.

Source:
BusinessDay

No comments:

Post a Comment

What are your thoughts on this post?