March 19, 2023

  • Bitcoin(BTC)$24,383.00-1.66%
  • Ethereum(ETH)$1,657.83-2.53%
  • Tether(USDT)$1.000.18%
  • BNB(BNB)$310.23-1.26%
  • USD Coin(USDC)$1.000.10%
  • XRP(XRP)$0.39-0.81%
  • Binance USD(BUSD)$1.000.05%
  • Cardano(ADA)$0.39-2.73%
  • Dogecoin(DOGE)$0.09-2.67%
  • Polygon(MATIC)$1.38-6.66%

SMEs in Nigeria Suffer More Cyber Attacks in 2022

0 2

CEM REPORT | In 2022, the number of Trojan-Password Stealing Ware (PSW) detections in Nigeria roses exponentially when compared to the same period in 2021.

Detection stood at 2,654 in 2022 compared to 1,076 in 2021.

In a report by Kaspersky, a Russian multinational cybersecurity and anti-virus provider, small and medium-scale enterprises (SMEs) in Nigeria face more cyber threats with attacks increasing by 89 percent.

Since COVID and implementation of several lockdowns, many companies have introduced the Remote Desktop Protocol (RDP), a technology that enables computers on the same corporate network to be linked together and accessed remotely, even when the employees are at home.

According to the cyber security firm, it detected and blocked 303,500 RDP attacks between January and April of 2022 through its cyber security application Kaspersky.

The firm added that the number has risen from 161,000 RDP attacks recorded in the same period in 2021.

The cyber security firm explained that Trojan-PSW is a malware that steals passwords along with other account information, which then allows attackers to gain access to the corporate network and steal sensitive information.

[READ ALSO] Cybersecurity: New Toolkit to protect over 41m MSMEs in Nigeria

Meanwhile the firm in its report noted that another popular attack tool used on small businesses is Internet attacks, specifically, web pages, adding that Internet attacks are cyber threat SMEs need to be protected against.

With the recent attack on Bet9ja and continuous hack on several Facebook and Instagram amongst other social media, SMEs in the internet space will be smart to own a special security solution that will empower IT administrators with a convenient tool for incident analysis and attack visualisation.

The faster analysis on where and how a leak occurs, the better and easier it will be to solve any negative consequences.

Share this

Leave a Comment

glo advert