• Home
  • Agric
  • Sci & Tech
  • Health
  • Environment
  • Hausa News
  • More
    • Business/Banking & Finance
    • Politics/Elections
    • Entertainments & Sports
    • International
    • Investigation
    • Law & Human Rights
    • Africa
    • ACCOUNTABILITY/CORRUPTION
    • Hassan Gimba
    • Column
    • Prof. Jibrin Ibrahim
    • Prof. M.K. Othman
    • Defense/Security
    • Education
    • Energy/Electricity
    • Entertainment/Arts & Sports
    • Society and Lifestyle
    • Food & Agriculture
    • Health & Healthy Living
    • International News
    • Interviews
    • Investigation/Fact-Check
    • Judiciary/Legislature/Law & Human Rights
    • Oil & Gas/Mineral Resources
    • Press Freedom/Media/PR/Journalism
    • General News
    • Presidency
  • About Us
    • Contact Us
    • Board Of Advisory
    • Privacy Policy
    • Ethics Policy
    • Teamwork And Collaboration Policy
    • Fact-Checking Policy
    • Advertising
  • Media OutReach Newswire
    • Wire News
  • The Stories
Facebook Twitter Instagram
Trending
  • Dangote plans refinery IPO in 2026
  • Wike targets 80% budget implementation
  • Zoho urges digital adoption for women
  • FRSC warns against attacks on personnel
  • Foundation deploys health officers in Abia
  • Ogun police seek NDLEA collaboration
  • Olubadan urges tax impact on citizens
  • FG hands over 132 housing units to Kwara
Facebook Twitter Instagram YouTube
AsheNewsAsheNews
  • Home
  • Agric

    Stakeholders push investment in Nigeria’s agribusiness

    April 16, 2026

    Nigeria faces 1m tonne palm oil deficit

    April 16, 2026

    WFP spends $5m on social protection in Nigeria

    April 16, 2026

    Dangote Sugar shareholders approve N500bn rights issue for expansion

    April 16, 2026

    Kenya pushes smart farming as Fahari Aviation, CropLife Kenya sign drone pact

    April 15, 2026
  • Sci & Tech

    Zoho urges digital adoption for women

    April 17, 2026

    MTN suspends xtratime over new FCCPC rules

    April 17, 2026

    NiRA launches DNS security for .ng domain

    April 16, 2026

    FG probes ‘sharp-sharp’ loan apps for data privacy breaches

    April 14, 2026

    SCB-Africa intensifies efforts to bridge science-policy gap in biodiversity conservation

    April 14, 2026
  • Health

    Foundation deploys health officers in Abia

    April 17, 2026

    UNILAG medicine faculty targets clinical innovation

    April 16, 2026

    Parasite free world unrealistic – FUTA professor

    April 16, 2026

    Niger first lady launches immunization campaign

    April 16, 2026

    Nigeria records rising lassa fever deaths

    April 15, 2026
  • Environment

    FG hands over 132 housing units to Kwara

    April 17, 2026

    SON hosts workshop on motor energy standards

    April 16, 2026

    Nigeria pushes for better water, sanitation

    April 15, 2026

    LAWMA launches green waste training

    April 15, 2026

    Flood: Nigeria’s 33 states at high risk in 2026 [FULL LIST]

    April 15, 2026
  • Hausa News

    Otti plans 250-room 5-star hotel in Umuahia

    April 11, 2026

    Anti-quackery task force seals 4 fake hospitals in Rivers

    August 29, 2025

    [BIDIYO] Yadda na lashe gasa ta duniya a fannin Ingilishi – Rukayya ‘yar shekara 17

    August 6, 2025

    A Saka Baki, A Sasanta Saɓani Tsakanin ‘Yanjarida Da Liman, Daga Muhammad Sajo

    May 21, 2025

    Dan majalisa ya raba kayan miliyoyi a Funtuwa da Dandume

    March 18, 2025
  • More
    1. Business/Banking & Finance
    2. Politics/Elections
    3. Entertainments & Sports
    4. International
    5. Investigation
    6. Law & Human Rights
    7. Africa
    8. ACCOUNTABILITY/CORRUPTION
    9. Hassan Gimba
    10. Column
    11. Prof. Jibrin Ibrahim
    12. Prof. M.K. Othman
    13. Defense/Security
    14. Education
    15. Energy/Electricity
    16. Entertainment/Arts & Sports
    17. Society and Lifestyle
    18. Food & Agriculture
    19. Health & Healthy Living
    20. International News
    21. Interviews
    22. Investigation/Fact-Check
    23. Judiciary/Legislature/Law & Human Rights
    24. Oil & Gas/Mineral Resources
    25. Press Freedom/Media/PR/Journalism
    26. General News
    27. Presidency
    Featured
    Recent

    Dangote plans refinery IPO in 2026

    April 17, 2026

    Wike targets 80% budget implementation

    April 17, 2026

    Zoho urges digital adoption for women

    April 17, 2026
  • About Us
    1. Contact Us
    2. Board Of Advisory
    3. Privacy Policy
    4. Ethics Policy
    5. Teamwork And Collaboration Policy
    6. Fact-Checking Policy
    7. Advertising
    Featured
    Recent

    Dangote plans refinery IPO in 2026

    April 17, 2026

    Wike targets 80% budget implementation

    April 17, 2026

    Zoho urges digital adoption for women

    April 17, 2026
  • Media OutReach Newswire
    • Wire News
  • The Stories
AsheNewsAsheNews
Home»Defense/Security»Information Security in Africa: The Canon Perspective, By Quentyn Taylor
Defense/Security

Information Security in Africa: The Canon Perspective, By Quentyn Taylor

Abdallah el-KurebeBy Abdallah el-KurebeOctober 4, 2021No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Implementing cybersecurity basics is key to reducing risk and building cyber-resilience

With remote and hybrid working a new ‘normal’ and cybercrime escalating at a rapid rate, more businesses are at risk than ever before. Quentyn Taylor, Director of Information Security at Canon Europe, Middle East and Africa, says implementing cybersecurity basics is key to reducing risk and building cyber-resilience.

Recent rapid digital transformation and reliance on cloud-based solutions has made businesses – in Africa as in the rest of the world – more vulnerable to cybercrime. In today’s global village getting hacked or being the victim of cybercrime inevitable.

The shift to hybrid working (https://bit.ly/3uEoVwZ) has expanded network perimeters, which now include the core office location as well as employees’ homes. Mobile and remote work can be beneficial to productivity but does open up new threat vectors with device management. The enormous growth in the use of connected devices – such as laptops, printers and phones – results in more entry points for possible attacks.

At the same time, cybercrime is evolving and becoming increasingly sophisticated. It’s shifted from trying to infect as many devices as possible to looking for weak links which can enable criminals to steal data or hold corporate systems to ransom.

A mistake or omission by a single employee – or even a third-party provider – can potentially bring down a whole company.

When employees work remotely – at home or in public spaces – they operate outside of the company’s usual controls; existing security measures may no longer be applicable or effective.

The risk is universal; even large, well-resourced companies have failed at times, often against basic attacks.

The Cost

Typical attacks vectors include malware, ransomware, identity theft and email phishing, possibly the most prevalent approach in Africa. Messaging apps like WhatsApp have also been used to compromise victims.

The financial impact of cybercrime can be enormous; the European-based Pathé cinema chain lost over $ 21 million to a Business Email Compromise (BEC) scam and in the US, CNA Financial paid out $40 million in ransom in 2020.

Such costs can be crippling, particularly for small and medium enterprises (SMEs) that may not have the financial resources to recover. The ‘infosec poverty line’ is a reality – many small businesses, the backbone of most African economies, simply cannot afford to employ dedicated IT professionals and the massive increase in the cost of cybersecurity and cyber insurance puts them out of reach for many.

Countermeasures

While you are never able to completely eradicate risk, there are simple steps to take that can build the cyber-resilience of almost every business. Work with your reality – whilst IS issues are global, they manifest differently in different areas; there isn’t a one-size-fits-all solution.  Focus on the basics, develop a plan and lead for success. Don’t attempt to force people to do as they are told, adjust the message dynamically to fit the actual situation. The priority is to lead in a way that keeps your business and your customers safe.

The first step is to check the internal and external IT perimeter for gaps. A single-entry point can allow an attacker in, rather like an open window is an invitation to an opportunist thief. In today’s fully connected workplace, every device is a potential entry point for criminals.

Everyone’s security and every piece of equipment needs to be on par.

You may have a partner who can assist – at Canon we offer our partners comprehensive assessments to help mitigate security vulnerabilities.

Look for third-party service providers with built-in security and a good track record, you may have already paid for security services through your email and internet provider; check what you already have and plan from there. Working at scale allows them to incorporate many security features a much more reasonable cost.

Most importantly, ensure your employees turn on security features in the software and devices they use. Multi-factor authentication is offered on almost all social platforms, is usually free and is one of the easiest ways to give your security a dramatic boost.

Ultimately, people are both your strongest and weakest link. It only takes one errant click on a phishing mail to open the company to risk. Educate employees on basic cyber hygiene and encourage them to come forward and share mistakes. If an error is out in the open, it can be fixed. Your defence strategy is only effective if breaches are reported.

Develop processes and systems that protect against loss if one person’s email is compromised.

You don’t need to be the most secure business; you just need to be more secure than your neighbours. Most criminals are opportunists, looking to attack easy targets. It’s not about spending; some companies invest heavily in IS but haven’t turned on email multi-factor authentication.

By taking control of your information and network and educating all your employees, you can keep one step ahead of cyber-criminals and continue to serve your customers with confidence.

Canon has developed useful tools for managing risk and workspace security including a guide available for free download (https://bit.ly/2YfXUEA) and the Canon Information Security Insights YouTube series (https://bit.ly/3B7HDzu)

Taylor is Director of Information Security at Canon Europe, Middle East and Africa

APO

Africa APO Canon Information Security
Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
Abdallah el-Kurebe
  • Website
  • Facebook
  • Twitter
  • LinkedIn

Related Posts

FRSC warns against attacks on personnel

April 17, 2026

Ogun police seek NDLEA collaboration

April 17, 2026

NDA promotes officers, urges greater commitment

April 17, 2026

Leave A Reply Cancel Reply

Dangote plans refinery IPO in 2026

April 17, 2026

Wike targets 80% budget implementation

April 17, 2026

Zoho urges digital adoption for women

April 17, 2026

FRSC warns against attacks on personnel

April 17, 2026
About Us
About Us

ASHENEWS (AsheNewsDaily.com), published by PenPlus Online Media Publishers, is an independent online newspaper. We report development news, especially on Agriculture, Science, Health and Environment as they affect the under-reported rural and urban poor.

We also conduct investigations, especially in the areas of ASHE, as well as other general interests, including corruption, human rights, illicit financial flows, and politics.

Contact Info:
  • 1st floor, Dogon Daji House, No. 5, Maiduguri Road, Sokoto
  • +234(0)7031140009
  • ashenewsdaily@gmail.com
Facebook Twitter Instagram Pinterest
© 2026 All Rights Reserved. ASHENEWS Daily Designed & Managed By DeedsTech

Type above and press Enter to search. Press Esc to cancel.