A new cyber security report has found out that insider help and collusion with external parties rank among the topmost likely sources of cyber-security breaches encountered by organisations in Nigeria.[blockquote right=”pull-right” cite=”The 2014 Nigerian Cyber Threat Barometer”]The 2014 Nigerian Cyber Threat Barometer noted that insider help/collusion with external parties is a way by which external criminals collude with insiders to commit cybercrime. This was identified among the major sources of cyber security breaches in the country. [/blockquote]
The survey carried out by Wolf Pack and DigitalJewels was reported in the newly-released 2014 Nigerian Cyber Threat Barometer which also identified that the Internet has simplified business processes and real-time generation of reports by Nigerian organisations.
According to the report, the undesirable consequences of access to the Internet are undeniable as the global computer network, “has brought unintended consequences such as criminal activities, spamming, credit card fraud, ATM fraud, phishing, identity theft and a blossoming haven for cybercriminal miscreants to perpetrate their acts.”
The 2014 Nigerian Cyber Threat Barometer noted that insider help/collusion with external parties is a way by which external criminals collude with insiders to commit cybercrime. This was identified among the major sources of cyber security breaches in the country.
Another source is pharming and phishing, which “refer to when hosted fake sites imitate the original websites of different organisations.” Hackers and crackers gain access to user data that have been collected on hacked sites using phishing.
Other sources highlighted by participants in the survey include malware, keyloggers, botnets and backdoor Trojans, Point of Sale (POS) data breaches, DoS attacks, web payment applications, website design mistakes, social media websites, Internet banking, identity theft, mobile phone SIM attack, unauthorised wireless access, external intrusion, lack of security standards, weak legislation and weak compliance monitoring.
The survey also highlighted individuals who could act as sources for data breaches. They include professional criminal syndicates, ignorant or uneducated users, internal users, hacktivists, social engineers, hackers and crackers, former employees, customers, script kiddies and cyber fraudsters