Why Employee Collaboration Is Key For Cybersecurity  

March 30, 2023
Bridging The Gaps To Safeguard The Future Of Hybrid Work 
Emmanuel Asika, Country Head at HP Nigeria

Many will hate to admit it, but it seems that, perhaps, it has become quite lucrative these days to be a cybercriminal.

Firstly, it is a thriving business. For instance, according to the FBI, there was a 207% increase in reported cases of cybercrime between 2008 and 2021, and almost $7 billion (₦3,223,080,000,000) in losses last year. In Nigeria, the peril of cybercrimes recorded a massive rise in the first six months of 2022, “with phishing and scams hitting 174%”. According to the Economic and Financial Crimes Commission (EFCC), well over 2,800 persons were convicted of cybercrimes in the country last year, and the Consumer Awareness and Financial Enlightenment Initiative (CAFEI) has projected a $6 trillion loss by 2030 to cybercrime within and outside Nigeria.

Join our WhatsApp Channel

Secondly, it has no entry requirement – yes, it is that easy and, quite cheap. Imagine this – the typical cost of compromised remote access credentials costs about ₦2,302 and can simply be bought on the dark web. Cybercrooks use these passes to access their prey’s enterprise networks. A report, The Evolution of Cybercrime, showed that 75% of advertisements for malware and 91% for exploits cost less than ₦4,604.40. Some years ago, it was much more expensive. For instance, as of 2009, cybercriminals paid well over ₦3.6 million for a standard malware kit.

Worse still, it has become increasingly easier than ever before for these hackers to work together in a specialized and concerted secretive supply chain. They have built fortes, proposing unique services like hiring of huge botnets to convey a customer’s preferred malware to thousands of targets, or hackers-for-hire who take full advantage of the destruction caused by ransomware – spreading an invasion of weak points in a network. The result of all these is that workers in scattered workplaces around the globe are now in more danger than ever beforeThe unclear distinction between private and work devices means that hybrid staff are not always shielded by enterprise defenses, thus the risk of attack is always there.  

But there is a way out, and it lies with the employees who are usually the first line of defense, and they must work together. With computer crime now a part of how we do business, and growing, the only way to beat criminals is to collaborate with one another to defend ourselves.

Knowing your enemies’ strategy 

Hackers the world over betray trust in daily interfaces and exchanges online, mostly via emails, to gain access to systems. It is a known fact that email remains the most common means for hackers to secure illegal access to networks, and once they are in, they try to monetize their access—deactivating the group’s backups, stealing delicate information, and installing ransomware. The effect of such a violation can be grievous, leading to operational interruption, repairs, affecting an organisation’s name, and leading to exposure of trade secrets and loss of intellectual property. As a result, corporate groups and their employees must work together to fortify their lines in this highly increasing risky atmosphere.

Setting up your protective line  

First, all employees must be conscious of the methods of hackers and promptly report any suspicious behaviour. They must also understand their respective roles in the defense of their organisation’s cyber systems. The employers, on their part, must back these endeavors by inspiring a positive security culture where employees are given clear instructions to be watchful for phishing and IP protection, ask for help, collaborate on ways to advance cyber safety, and teach coworkers and family members.

READ ALSO: How Archive Files, HTML Smuggling Help Cyber Criminals Evade Detection Tools – HP Wolf Security Report

As a group, companies and organisations should place emphasis on understanding the basics, constantly working on their resilience, and acting as a team to lessen their risk of exposure. Quality security begins with IT asset detection – you can only protect the devices, software and systems being used by your workers. The next thing is to adhere to best practices in susceptibility management and multidimensional authentication, while putting in place the personnel, procedures, and know-how to spot, thwart, and recover from likely attacks. This entails anticipating and planning for the most unpleasant of scenarios, executing procedures to reduce supply chain and insider risks, and rehearsing your response. Such rehearsal drills are not only important in getting you ready for the real attacks when they come, but also helps to expose hitherto unknown problems and inspire process improvements.

An organisation can also exploit the advantages of its security investments by closing known common attack routes, especially malware sent via email and the web, which can be nullified using prevention technologies like the hardware-enforced isolation of HP Sure Click Enterprise. Such solutions help protect systems not by detecting malicious activity, but by allowing staff to undertake normal daily routines, including risky undertakings like the opening of email attachments safely and shielding IT departments against unidentified threats.

Collaborating with industry peers 

Cyber security is a collaborative endeavor. Organisations can confidently strengthen the kind of actions and habits they will like their staff to adopt through vigorous and regular awareness sessions and exercises tailored to their needs. A good example is HP’s recently released noir–inspired cybersecurity training film for its employees. This will help the organisation build a security culture, with staff encouraged to individually manage risks. It must be pointed out too that these collaborations should not only be internal (within organisations), but also with other players in the industry. Such external cooperation, including sharing of threat intel, will help the organisation to gauge its cyber security strength and performance, equip it with current information on cybercrime trends and risks, and how best to stay ahead of cybercriminals in the current year, and in years to come.

 

Emmanuel Asika, Country Head, HP Nigeria 

Emmanuel Asika
+ posts

Featured Stories

Latest from Opinion

Politics, Propaganda, The Fight Over The 76 Oil Wells

By ETIM ETIM Gov. Bassey Otu of Cross River State arrived Margaret Ekpo Airport, Calabar, from an official trip to Abuja last week and addressed a large crowd of APC members and supporters who have been waiting for hours for him.Join
Chidi Anslem Odinkalu

It’s Time to Save Judicial Appointments from Corruption

By Chidi Anselm Odinkalu For nearly five years, Abia State has been the site of a bewildering contest over the crisis of corruption that now bedevils Nigeria’s judicial appointment process. Essentially, the appointment of judges in Nigeria has become something akin to

Amended Electoral Act and Inducement of Apathy 

By Emmanuel Nnadozie Onwubiko The past few weeks have seen frenetic and combative social advocacy by hundreds of protesters who gathered at the entrance to the imposing National Assembly complex to demand that the amendments to the electoral Act must not
How 3.7m Children In Northeast Nigeria Face Malnutrition Crisis – FAO Reveals

Shooting Down Inflation and Rising Poverty

By Emmanuel Nnadozie Onwubiko For Nigerians, there is a generally agreed principle that the government and the people must always be on different lanes in the making of any claim concerning development, redistribution of wealth and the poverty rates. Whereas government

The Seyi Tinubu’s jellof rice, loaves of bread

By Emmanuel Nnadozie Onwubiko Seyi Tinubu is the self-styled ‘First Son’ of the Federal Republic of Nigeria. As the most notable Son of the president, Seyi Tinubu is perhaps the most publicly celebrated Son of any elected president in the political
Abia State Governor-Elect, Dr. Alex Otti, OFR, listens as Lynda Saint Nwafor, MTN's Chief Enterprise e-Business Officer makes a point. 
Previous Story

MTN Team Visits Abia Governor-elect Alex Otti, Plans Investments

Next Story

Super Falconets Set To Participate In Inaugural WAFU U-20 Nations Cup 

Don't Miss

Insecurity: Army Chief Tasks Soldiers On Effective Operations

Nigerian Soldiers have been directed to carry out their operations
Five Most Profitable Insurance Stocks In Q3 2025

Five Most Profitable Insurance Stocks In Q3 2025

Within the third quarter (Q3) of 2025, shareholders of 17