• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home African

50% Of Data Breaches Are Inside Job, How’s Nigeria Protecting Data Of Millions Of Nigerians

Paul Balo by Paul Balo
May 17, 2016
in African, Government, Research/How to do it, Security
Share on FacebookShare on Twitter

The biggest nightmare security agencies face across the world is not just organised terrorism as we know it as in a cell of bad actors but the lone terrorist is one who is greatly feared in the security world. The lone terrorist is scarier because he/she probably would go the same religious institution as you, use the same public facilities as you without raising any eyebrows the whole time. What do you do when that’s the kind of enemy you now face?

What is true for terrorism and crime fighting  is true sometimes for IT breaches as well. A new Verizon report   tagged 2015 Data Breach Investigations Report put this in focus once more. When you have a breach of data, it likely up to 50 percent of the time that it could be an inside job. The report noted that 30 percent of such cases could largely be  attributed to negligence on the part of the worker. An example of this could be sending information to the wrong hands and while that is common these days considering the amount of data workers are exposed to these days. Another 20 percent of the 50 percent is most likely to be deliberate as in the case of Edward Snowden for various reasons. The most likely reason being that a worker could act alone to steal company information for profit by selling them to third party or direct competitors.

But in reality, a bigger danger to many companies and to customers’ sensitive data comes from seemingly benign faces inside the same companies that are trying to keep hackers out: a loan officer tasked with handling customers’ e-mail, an attendant at a nursing home, a unit coordinator for the main operating room at a well-regarded city hospital.

Often, that translates to employees on the front lines stealing patient medical data or client social security numbers, which can then be sold on the black market or used to commit fraud like collecting someone else’s social security benefits, opening new credit card accounts in another’s name, or applying for health insurance by assuming the identity of someone else. In Nigeria for example, it’s quite common to see someone advertising emails and telephone numbers for sale to businesses who might need such data for marketing but imagine what this kind of data could be used for in the wrong hands. From annoying bulk messages to other possible criminal acts, this data is often used in the wrong way. Usually in an election year, you begin to see millions of people who wish to vote turn out to register to vote and this information is expected to be stored in a secure location with access to authorised personnel only. This process is repeated for national ID card, drivers licence, SIM card registration, bank verification number and international passport. This is a huge pool of data that contains personal information of ordinary Nigerians and not once have we heard that someone was prosecuted for data breaches. Come to think of it, how easy is it for a private individual to obtain such an organised database without inside help? How structured/accurate are these information out there you may ask; there are databases out there that are being sold at give away costs. They are so organised that you see millions of records of peoples’ names and surnames, telephone numbers, states of residence/origin, age, residential address. Now that’s a massive set of data right there and in the wrong hands you can imagine the scale of damage that can be done to individuals or a group.

This brings to mind what the national ICT policy is and how much of that policy is enforced. Has there ever been an organised investigation into how data of this magnitude was ever leaked in the first place and after such investigation, how many people were prosecuted for this. In addition, what’s the national policy for public sector data storage? With every incoming administration comes policies that remain largely unimplemented in the ICT sector. You still have public sector information lying in foreign and local privately controlled servers and this ought not to be and that’s not to say the government shouldn’t at any time patronise the private sector in data storage management but what’s the policy regarding this.  In 2013, the NSA (the American National Security Agency) contractor Edward Snowden was able to copy a ton of data to an external drive without immediate detection and that’s the kind of threat we face in today’s world. It’s not just cyber wars, it could be the quiet and loving staff who has other intentions other than discharging their primary duties.

The difference between Africa and the western world when it comes such breaches is that while organisations (public or private) are constantly looking for new ways to  guard against such breaches, in Nigeria for example there’s no formal investigation into how employees could make away with such information and begin to sell them to the highest bidder. This is not limited to government agencies alone. When I go to register my SIM card at the store of a  local representative of one of the big telecom companies, how safe is the data I give them which is eventually copied to NCC (Nigerian Communications Commission) servers. How’s the data being managed and who has access? These are questions we ought to answer honestly so that we can at least reduce the flow of public data on the streets. The Verizon report believes most of these breaches come from the public sector and it looks as if the private sector is doing a better job of managing data probably because the government has more employees and handles more data than the private sector.

The report also highlighted the effects of phishing (the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online), malware and other vulnerabilities as well as other big causes of data breach in institutions.

Verizon is  an American company and is the second biggest telecom company in the world after China mobile with market value of $202.5b/40.3tr Naira, revenue of $127.1b/25.2tr Naira and profit $9.6b/2tr Naira in 2015.

Read/Download the Verizon document below;

Loader Loading...
EAD Logo Taking too long?
Reload Reload document
| Open Open in new tab

Download

Related Posts:

  • bxk6r5Uk-Obi-4
    The Problem With The Leaked Phone Call Between Peter…
  • travis-kalanick-anthony-levandowski
    Israel Reportedly Confiscates $1.7m Worth Of Crypto…
  • X3XTFPQXFBKUVLKAWDUTX6U2SM
    UK and US Seek to Resolve Apple Encryption Dispute
  • The Nigerian Ministry of Information Cautions Google’s YouTube to Modify its Social Rules.
    The Nigerian Ministry of Information Cautions…
  • A computer popup box screen warning of a system being hacked, compromised software environment. 3D illustration.
    Biggest Data Breaches Caused By Security Misconfigurations
  • REv-CC-FutureProofIT-AdressingInsiderThreats-02@2x
    The Silent Enemy: How Insider Threats Are Stealing…
  • generative ai
    Generative AI Introduces New DLP Challenges
  • minister_grant_chief_africa_and_a_traffic_officer_with_the_new_hand-held_device_3_0
    SA e-Government Prepares To Deploy High-End Security…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: governmentsecurity
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Select Category

    Receive top tech news directly in your inbox

    subscription from
    Loading

    Freshly Squeezed

    • Vietnam Will Soon block Telegram, App Owners are Surprised May 24, 2025
    • Widespread Downtime Reported By X Users May 24, 2025
    • MongoDB Enters Africa Through Nigeria Targeting $100B Digital Market May 24, 2025
    • Meta Quest’s Headgear Will Soon Support 3D Instagram Images May 24, 2025
    • Mozilla To Shut Down Pocket To Concentrate On Firefox May 24, 2025
    • OpenAI Upgrades Operator Agent’s AI Model May 24, 2025

    Browse Archives

    May 2025
    MTWTFSS
     1234
    567891011
    12131415161718
    19202122232425
    262728293031 
    « Apr    

    Quick Links

    • About TechBooky
    • Advertise Here
    • Contact us
    • Submit Article
    • Privacy Policy
    • Login

    © 2021 Design By Tech Booky Elite

    Generic selectors
    Exact matches only
    Search in title
    Search in content
    Post Type Selectors
    • African
    • Artificial Intelligence
    • Gadgets
    • Metaverse
    • Tips
    • About TechBooky
    • Advertise Here
    • Submit Article
    • Contact us

    © 2021 Design By Tech Booky Elite

    Discover more from TechBooky

    Subscribe now to keep reading and get access to the full archive.

    Continue reading

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok