
Business Analysis: How to analyze any startup
Whenever the word “Cyberattack” comes up, in the mind of a Hollywood action thriller fan. It brings to mind a ‘James Bond’ movie. A fast-paced and emotional tensed scenario that involves a “criminal” mastermind attempting to breach the most secured and complex security networks or computers, with the aim of gaining unauthorized control or inserting malicious files that could cripple some parts or the entire system. This is equally followed closely by another person or group of persons who are tasked with pursuing this mastermind and bringing his/her activities to a halt or at least limiting the damage that could be caused to the minimum. Now, while this might seem far fetched for the average Nigerian small business, it does not exempt small businesses from the possibility of being attacked.
Cyberattacks happen when ‘hackers’ attempt to breach computers, electronic networks, systems, mobile devices maliciously. Hence cyber security is the practice of preventing such attacks from happening by deploying technological tools and skills. In the case of a small business, that would mean, preventing malicious attacks from affecting the operation of your business.
A recent report recently put cybersecurity threats on small businesses in Nigeria at a whooping 2308 per week! Quick math easily puts that figure at 120,016 per year. What is particularly disturbing is that these attacks happen in a wide range of formats, making it very likely for businesses to fall victim to any one of these formats.
A list of some of such Cyber threats are;
Social Engineering and Phishing. This one is particularly popular in Nigeria, especially in the banking industry. Social engineering and phishing happen when a user of an internet banking service as an instance is manipulated into willfully giving out sensitive information that could be used to access their bank account or card detail. This unfortunately leads to their monies being wiped out from their accounts.
Vishing. This is another popular one in Nigeria. This is coined from Voice and Phishing. Imagine getting a call from a random number, you answer and the caller goes “Hello my name is XXX, from ABC bank. Your debit card is going to be blocked in 3 days unless we help you resolve it. You can resolve it very easily but I’ll need your card details and CVV number”. If the call recipient takes the bait and gives out such information, the person has become a victim of vishing and as expected the consequence will be a cleaned out account.
Angler Phishing. Picture a disgruntled customer coming on social media to air their grievance about a poor service they recently received from a service provider. He/she then gets a DM from what looks like the social media handle of the service provider requesting to help with resolving the issue. The social media ‘handler’ goes ahead to request that the disgruntled customer gives out privileged information only to use such information to breach and of course inflict damage on such customer. This is how angler phishing occurs and it is also a top contender for frequent cyberattacks that happen to small businesses.
As a caveat, it will be noteworthy to point out that cyber-attacks are constantly evolving and getting more sophisticated. You might not be able to prevent all forms of cyberattack, let’s face it. Even the biggest tech companies in the world receive loads of threats. Some of these threats succeed. A few giants have had their security breached. In 2021, social media giant Facebook had 533 million Facebook user details leaked. In 2014, Apple had its iCloud service hacked. These are just to mention a few. Now back home in Nigeria, a lot of companies rarely report such breaches, so it is not readily available to know which company or even government agency has suffered a cyberattack but it is common knowledge that these attacks happen so often. It is safe to say that the topic of cyberattacks and breaches are unfortunately handled with so much secrecy
Ensure you use multi-factor authentication (MFA). Multi-factor authentication requires the user to provide two or more verification factors to get access to a device, account, application, etc. This adds an extra layer of security in the sign-in process as it requires users to enter different independent credentials to enable access.
The subject of cyber security for your business is inexhaustible. Beyond the mere fact that your business needs it, it also improves customer confidence in your business. There exist regulatory bodies and legislative acts around data management in Nigeria, it will do your business well as a legal entity to align with their goals and objectives.
From time to time, also test the parameters you have put in place to see how your business stands against potential threats. Frequently doing this, makes it easier to spot weak points that oversight might not have previously covered or envisaged.