Cybercrime is a Pressing Threat to Economic Growth in West Africa

Cybersecurity

By Titilayo Adewumi

While organisations across West Africa work to recover from the economic impact of the pandemic, the global cybercrime industry is going into overdrive. An increasingly sophisticated cybercrime industry is launching a range of attacks aimed at organisations and critical infrastructure. Such attacks are growing in volume and sophistication, putting our collective economic recovery at risk at a time when organisations invest more heavily in digital technologies.

Global attacks on Internet of Things (IoT) devices, for example, have risen 300% in 2019 alone, and cost organisations untold amounts of revenue and disruption to their business operations.

Cybersecurity
Cybersecurity

One study found that the average cost of cybercrime is $13-million per successful attack, a huge 72% increase over the past five years.

The growing digitisation of industries across the region, and the increasing power of the tools at cybercriminals’ disposal, meaning the cost of such attacks is likely to grow even further over the coming years.

In short, cyberattacks are posing an existential threat to the economic recovery of the West Africa region.

Cybercriminals Set Sights on Oil and Gas ‘Whales’

The oil and gas sector is central to the economic fortunes of the West Africa region. In Nigeria alone, the sector accounts for 10% of GDP, and revenue from petroleum exports contribute 86% of total exports revenue.

Read also:Every Digital Business Needs a Data Strategy

Upstream revenue for oil and gas in the region is expected to register a compound annual growth rate (CAGR) of 6.7% between 2020 and 2025, while crude oil production could register a CAGR of 9.63% over the same period. Worryingly, cyberattackers ruthlessly targeted the global oil and gas sector.

A 2017 study found that 68% of companies in the sector had experienced at least one compromise that had resulted in the loss of information or a disruption in their operations in the past year.

In a recent example, cybercriminals successfully shut down the Colonial Pipeline, effectively halting 50% of the supply of petrol and diesel to the US East Coast.

In another example, ExxonMobil revealed it blocks more than 64 million emails, 139 million internet access attempts and 133 000 other potentially malicious actions every month.

The economic consequences of a successful cyberattack on this critical sector can be devastating to a region already suffering collateral damage from the pandemic. The situation calls for a radical rethink of how organisations across the region – and across industries – bolster their defences and protect against cyberattacks.

Attacks on ERP Systems Growing

As the nerve centre of modern intelligent enterprises, ERP (Enterprise Resource Planning) systems are increasingly targeted by cybercriminals. Attackers know these systems run business-critical applications and house sensitive information, so any data breach could provide access to information they can later use in the service of a range of cybercrime activities.

Read also:Again, Former Investors Lead $42m Series B Funding Round In Nigerian Fintech FairMoney

As these systems increasingly shift to the cloud and integrate a growing suite of business applications, the opportunities for cyber attackers increase too. The amount of transactional data in typical ERP systems, for example, represents a veritable gold mine to cybercriminals.

So does the information about vendors, suppliers and partners – the more cybercriminals know about the internal operations of a business, the easier they will find vulnerabilities to exploit.

The Nigerian Data Protection Regulation, which was announced in 2019, is Nigeria’s most comprehensive data protection law and is set to transform how organisations collect and process data in the country.

Organisations should look at shifting their attitudes to security and treat it as a critical business imperative for both compliance and better protection against attack.

Taking Steps to Securing West African Enterprises

A risk-based approach that is endorsed by the board and focuses on protecting the organisation’s key assets is needed. Organisations need to get a holistic view of their security risks and then implement solutions and processes that help secure and protect data, applications, systems and end-users.

The best defences typically include both technical security and transactional monitoring – in real-time – to allow security teams to take accurate and appropriate action to keep systems operating and data safe. Integrating an Enterprise Threat Detection solution for example gives insight into suspicious activities in an organisation’s ERP and other business-critical applications.

Read also:Nigeria’s Terragon Verified as Leader in Data and Marketing Technology

This allows organisations to identify breaches as they occur and react in real-time to neutralise any dangers.

A real-time data platform can help efficiently analyse and correlate log data to help security teams understand what happened within an application, database, operating system or network component, and improve how the organisation scouts for cyberattacks across its most valuable IT assets.  

The importance of ERP systems to the effective running of West African enterprises makes them prime targets for cyberattacks.

SAP has worked with enterprise security leaders around the world to develop tools that seamlessly integrate with ERP systems and help protect an organisation’s critical data assets from cyberattacks and data breaches.

Organisations across the region need to recognise the threat that cybercrime poses to their operations, their reputations, their employees and their partners.

Business leaders, their security teams and their technology partners need to urgently implement new controls or risk becoming the latest victim in a rising tide of highly damaging – and increasingly sophisticated – cybercrime.

Titilayo Adewumi is the Regional Sales Director: West Africa at SAP.

Kelechi Deca

Kelechi Deca has over two decades of media experience, he has traveled to over 77 countries reporting on multilateral development institutions, international business, trade, travels, culture, and diplomacy. He is also a petrol head with in-depth knowledge of automobiles and the auto industry

Mobile Authentication Can Be the Key to Negating Cybercrime in East Africa

Cybersecurity

The rapid pace of digital transformation in East Africa has had a significant impact on not only how people live their lives, but also on how communication and commerce are conducted, allowing the modern customer to do everything – immediately. This has also had the unintended consequence of altering the way we are targeted by fraudsters and cybercriminals, notably changing the nature of cyber threats and attacks that we face in a mobile-first digital world.

Cybersecurity
Cybersecurity

The Price of Cybercrime

According to an Accenture report published in 2019, the total value at risk of cybercrime over the next five years is an estimated $5.2 trillion. The average cyberattack costs $13 million, according to the same report, with phishing, social engineering and stolen device crime making up $2.4 million of the cost of an average attack.

Statistics drawn from various reports show that the threat of cybercrime and insecurity is prevalent in the East African region. Uganda lost 42 million shillings to cybercrime in 2017, while in 2018, Rwanda lost six billion francs. In Kenya, between April and June 2019 alone, the country experienced 26.6 million cyber threats.

Read also:Endeavor Joins Latest Funding Round In South African Cybersecurity Startup, Sendmarc

Additionally, in a mobile-first digital landscape such as the East African region, the proliferation of mobile devices and mobile Internet penetration has opened the door to mobile cybersecurity threats. Mobile users are at risk of threats such as SIM card swap, account takeover, “man-in-the-middle” and phishing attacks.

High Internet Penetration

As of December 2020, reports Statista, Kenya had an Internet penetration of approximately 85.2%. This high rate is mainly because Kenya is home to M-Pesa, a mobile wallet provider that offers a secure payment system that encourages Internet access.

Therefore, mobile authentication is becoming increasingly important in the overall East African market, not only as a means to effectively counter mobile cybersecurity threats, but to simultaneously enhance customer experience (CX) and increase engagement with brands.

Read also:National Bank Of Egypt Adopts RippleNet Blockchain Technology

Mobile authentication is the process of verifying a user’s identity through their mobile device. This verification can be done seamlessly, without interrupting the customer experience. In practice, this means that organisations can streamline processes while simultaneously protecting their business and their customers from cybercrime.

Mobile authentication services verify users’ identities through different means, including Silent Mobile Verification (SMV), Know Your Customer (KYC), SIM Swap Detection and Instant Form Filling.

The advent of smartphones has led to a steady rise in mobile shopping across East Africa, with recent data showing that consumers are becoming more comfortable with completing transactions on their phones. This is in no small part due to the increase in mobile security and customer trust.

Increasing User Trust and Safety

The advantages of proper mobile authentication are multiple, as it touches upon the entire customer journey. By creating a safe mobile environment, organisations can increase user trust and safety. Mobile verification continuously validates the customer’s identity throughout the customer journey. This increases user trust and safety by keeping their account protected.

Read also:MTN Partners WhatsApp for Online Payments in South Africa

Mobile authentication can also facilitate faster and more convenient onboarding. Silent verification can ensure customers are who they say they are during the onboarding process, and instant form filling speeds up the process. Furthermore, mobile authentication can also lead to reduced cart abandonment, as instant form filling makes the shopping experience more streamlined and convenient.

At the same time, mobile authentication can ensure GDPR compliance, as authentication services are based on a user-centric approach, ensuring that neither companies nor mobile network operators learn anything new about the end-user, apart from the information they already hold.

Mobile authentication services help to keep customers protected while improving user experience and increasing engagement.

Mobile authentication protects user information by providing a strong authentication layer consisting of three real-time identification and authorisation services. These are used to safeguard online transactions for user-facing applications and mobile websites, resulting in an improved and more secure user experience.

Kelechi Deca

Kelechi Deca has over two decades of media experience, he has traveled to over 77 countries reporting on multilateral development institutions, international business, trade, travels, culture, and diplomacy. He is also a petrol head with in-depth knowledge of automobiles and the auto industry