• Latest
  • Trending
NITDA warns against digital security threats in Nigeria

NITDA warns against digital security threats in Nigeria

August 6, 2023
Edtech startup The Invigilator raises $11 million to scale its AI platform

Edtech startup The Invigilator raises $11 million to scale its AI platform

September 6, 2025
iXAfrica receives RMB financing to fast-track 20 MW expansion in Nairobi

iXAfrica receives RMB financing to fast-track 20 MW expansion in Nairobi

September 6, 2025
OpenAI challenges LinkedIn with new AI-powered hiring platform

OpenAI challenges LinkedIn with new AI-powered hiring platform

September 6, 2025
Tanzanian fintech NALA takes its services to Kenya

Tanzanian fintech NALA takes its services to Kenya

September 6, 2025
Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

September 5, 2025
Meta Brings Back Facebook Poke with Emojis and Streaks

Meta Brings Back Facebook Poke with Emojis and Streaks

September 5, 2025
Know why they’re calling: Truecaller launches AI-powered insights

Know why they’re calling: Truecaller launches AI-powered insights

September 5, 2025
Visa harnesses local partnerships to launch Visa Pay in DR Congo

Visa harnesses local partnerships to launch Visa Pay in DR Congo

September 5, 2025
Betika denies recent reports of security breach

Betika denies recent reports of security breach

September 5, 2025
10 things you can actually buy with crypto in Africa

10 things you can actually buy with crypto in Africa

September 5, 2025
Your one-stop tech hub! Get the latest updates on AI, cybersecurity, fintech, and emerging technologies.
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Tech News Africa Tech News

NITDA warns against digital security threats in Nigeria

Hauwa Ali by Hauwa Ali
August 6, 2023
149 1
0
NITDA warns against digital security threats in Nigeria
465
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

The National Information Technology Development Agency (NITDA) has raised an alarm over the activities of a hacktivist group targeting Nigeria’s critical digital infrastructure.

This group, known for politically and religiously motivated cyber campaigns, poses a significant risk to the country’s vital information systems.

NITDA emphasizes the urgent need to fortify cyber defences to safeguard against potential malicious intrusions and protect critical information and infrastructure.

The hacktivist group’s tactics involve targeted attacks on government digital services, primarily employing Distributed Denial of Service (DDoS) attacks. Their track record of successful attacks in various countries highlights the potential severity of the threat. NITDA warns that cyber-attacks are not a distant concern but rather an imminent danger, demanding immediate action.

RelatedPosts

Jigawa kicks off digital skills bootcamp for over 1,050 pupils

NITDA partners with Google to digitise Nigeria’s educational system

SecDojo strengthens cybersecurity push in Nigeria with NITDA alliance

Read also: NITDA, the GAGE company to co-create Africa International Tech Expo

Consequences of cyber attacks

The agency stresses that the consequences of cyber-attacks can be severe and far-reaching. They include:

Economic Losses – Substantial financial losses to businesses and governments. Data breaches, ransomware attacks, and other forms of cybercrime can result in stolen intellectual property, customer information, and financial data. These incidents lead to costly recovery efforts, litigation, and damage to a company’s reputation, ultimately affecting its bottom line.

Disruption of Critical Services – Cyber attacks targeting critical infrastructure, such as power grids, transportation systems, and healthcare facilities, can lead to severe disruptions in essential services. This can cause chaos, affecting public safety, health, and economic activities, amplifying the impact on society.

Loss of Public Trust and Reputation – When organizations fall victim to cyber attacks, public trust in their ability to protect sensitive information diminishes. This loss of confidence can lead to customers, clients, or citizens avoiding their services and seeking alternatives. Rebuilding trust and a tarnished reputation can be a challenging and time-consuming process.

Intellectual Property Theft – Cyber espionage and data breaches can result in the theft of valuable intellectual property and trade secrets. Stolen proprietary information can be sold or used by competitors, undermining a company’s competitive advantage and hindering innovation.

Psychological and Emotional Impact – Individuals affected by cyber attacks may experience psychological distress, anxiety, and fear due to the violation of their privacy and security. This emotional toll can have long-term effects on victims and their well-being.

National Security Threats – Cyber attacks on government institutions and critical infrastructure can pose significant threats to national security. State-sponsored attacks or cyber warfare attempts can target defense systems, diplomatic communications, and classified information, potentially compromising a country’s sovereignty.

Legal and Regulatory Consequences – Organizations that fail to protect their digital infrastructure adequately may face legal and regulatory repercussions. Data protection laws and regulations worldwide require companies to safeguard sensitive information, and non-compliance can lead to fines and legal actions.

Social Engineering and Identity Theft – Cybercriminals often use social engineering tactics to deceive individuals into revealing sensitive information, such as passwords or financial details. Identity theft can lead to financial ruin and personal hardship for victims.

Erosion of Cyber Resilience – Repeated cyber attacks can erode an organization’s cyber resilience, making them more vulnerable to future threats. Organizations must invest in continuous cybersecurity measures to stay ahead of evolving attack techniques.

Geopolitical Tensions – Cyber attacks between nations can escalate geopolitical tensions and lead to diplomatic conflicts. Attacks targeting other countries’ infrastructures can strain international relations and create complex political situations.

NITDA calls for proactive measures to bolster cybersecurity across all sectors.

NITDA to initiate Code of Practice on Artificial Intelligence (AI)

 

NITDA’s Recommendations to Safeguard Digital Infrastructure

To guard against targeted attacks on government institutions and critical sectors, NITDA’s Computer Emergency Readiness and Response Team (NITDA-CERRT) advises all Ministries, Departments, and Agencies (MDAs) and other providers of critical services to implement measures to prevent DDoS attacks. Here are their recommended strategies:

Deploy DDoS Monitoring Systems:

MDAs and other organizations should employ DDoS monitoring systems to detect early signs of DDoS attacks, allowing for prompt response and mitigation.

Minimize Attack Surface Area:

By reducing the target’s exposure, organizations can limit options for attackers, making it easier to build effective protections in a single place. This includes obscuring the target and closing unused ports and protocols to minimize potential points of attack.

Fortify Cyber Defenses:

Organizations are advised to implement or subscribe to DDoS protection features, applications, or services. Examples include rate limiting, load balancing, traffic filtering, Content Delivery Networks (CDN), and Web application Firewalls. These measures can significantly bolster cyber defences against disruptive DDoS attacks.

Enhance Internet Connectivity:

Hosting providers should offer abundant redundant Internet connectivity to ensure systems can manage significant volumes of traffic effectively. This increased resilience helps to withstand potential DDoS attacks.

Network Hardware Configuration:

Configuring network hardware, such as firewalls or routers, to drop incoming ICMP packets or block DNS responses from outside the network (by blocking UDP port 53) can further enhance protection against DDoS attacks.

With the hacktivist group posing a serious threat to Nigeria’s vital digital infrastructure, NITDA urges all stakeholders to recognize the urgency of reinforcing cyber defences.

By implementing the recommended strategies and adopting a proactive cybersecurity approach, Nigeria can mitigate potential risks and safeguard critical information and services from malicious intrusions. Preventative actions will be essential to maintain the integrity and stability of the country’s digital ecosystem.

Tags: digital security threatsNITDA
Hauwa Ali

Hauwa Ali

No Result
View All Result

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business

Follow Us:

  • facebook
  • instagram
  • Twitter(X)
  • Linkedin
  • YouTube
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Techpression.com -Techpression Media Limited

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression.com -Techpression Media Limited

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.