Connect with us

Opinion/White Papers

Cyber Risk is the New Threat to Financial Stability

Published

on

, SiliconNigeria

By Jennifer Elliott and Nigel Jenkinson

Many of us take for granted the ability to withdraw money from our bank account, wire it to family in another country, and pay bills online. Amid the global pandemic, we’ve seen how much digital connection matters to our everyday life. But what if a cyberattack takes the bank down and a remittance doesn’t go through?

As we become increasingly reliant on digital financial services, the number of cyberattacks has tripled over the last decade, and financial services continue to be the most targeted industry. Cybersecurity has clearly become a threat to financial stability.

Given strong financial and technological interconnections, a successful attack on a major financial institution, or on a core system or service used by many, could quickly spread through the entire financial system causing widespread disruption and loss of confidence. Transactions could fail as liquidity is trapped, household and companies could lose access to deposits and payments. Under extreme scenarios, investors and depositors may demand their funds or try to cancel their accounts or other services and products they regularly use.

, SiliconNigeria

Hacking tools are now cheaper, simpler and more powerful, allowing lower-skilled hackers to do more damage at a fraction of the previous cost. The expansion of mobile-based services (the only technological platform available for many people), increases the opportunities for hackers. Attackers target large and small institutions, rich and poor countries, and operate without borders. Fighting cybercrime and reducing risk must therefore be a shared undertaking across and inside countries. 

, SiliconNigeria

While the daily foundational risk management work — maintaining networks, updating software and enforcing strong ‘cyber hygiene’ — remains with financial institutions, there is also a need to address common challenges and recognize the spillovers and interconnections across the financial system. Individual firm incentives to invest in protection are not enough; regulation and public policy intervention is needed to guard against underinvestment and protect the broader financial system from the consequences of an attack.

In our view, many national financial systems are not yet ready to manage attacks, while international coordination is still weak. In new IMF staff research, we suggest six major strategies that would considerably strengthen cybersecurity and improve financial stability worldwide.

Cyber mapping and risk quantification

The global financial system’s interdependencies can be better understood by mapping key operational and technological interconnections and critical infrastructure. Better incorporating cyber risk into financial stability analysis will improve the ability to understand and mitigate system-wide risk. Quantifying the potential impact will help focus the response and promote stronger commitment to the issue. Work in this area is nascent—in part due to data shortcomings on the impact of cyber events and modelling challenges—but must be accelerated to reflect its growing importance.

Converging regulation

More internationally consistent regulation and supervision will reduce compliance costs and build a platform for stronger cross-border cooperation. International bodies such as the Financial Stability Board, Committee on Payments and Market Infrastructure, and Basel Committee, have begun to strengthen coordination and foster convergence. National authorities need to work together on implementation.

Capacity to respond

As cyberattacks become increasingly common, the financial system has to be able to resume operations quickly even in the face of a successful attack, safeguarding stability. So-called response and recovery strategies are still incipient, particularly in low-income countries, which need support in developing them. International arrangements are necessary to support response and recovery in cross-border institutions and services.

Willingness to share

More information-sharing on threats, attacks, and responses across the private and the public sectors will enhance the ability to deter and respond effectively. Yet, serious barriers remain, often stemming from national security concerns and data protection laws. Supervisors and central banks need to develop information sharing protocols and practices that work effectively within these constraints. A globally agreed template for information sharing, increased use of common information platforms, and expansion of trusted networks could all reduce barriers.

Stronger deterrence

Cyberattacks should become more expensive and riskier through effective measures to confiscate crime proceeds and prosecute criminals. Stepping up international efforts to prevent, disrupt and deter attackers would reduce the threat at its source. This requires strong co-operation between law enforcement agencies and national authorities responsible for critical infrastructure or security, across countries and agencies. Since hackers know no borders, global crime requires global enforcement.

Capacity development

Helping developing and emerging economies build cybersecurity capacity will strengthen financial stability and support financial inclusion. Low-income countries are particularly vulnerable to cyber risk. The COVID-19 crisis has highlighted the decisive role that connectivity plays in the developing world. Harnessing technology safely and securely will continue to be central to development and with it a need to ensure that cyber risk is addressed. As with any virus, the proliferation of cyber threats in any given country makes the rest of the world less safe.  

Addressing all these gaps will require a collaborative effort from standard-setting bodies, national regulators, supervisors, industry associations, private sector, law enforcement, international organizations, and other capacity development providers and donors. The IMF is focusing its efforts on low-income countries, by providing capacity development to financial supervisors, and by bringing the issues and perspectives of these countries to the international bodies and policy discussions in which they are not adequately represented.

Jennifer Elliott is Division Chief of Technical Assistance Strategy in the IMF’s Monetary and Capital Markets Department.

Nigel Jenkinson is Division Chief of Financial Regulation and Supervision in the IMF’s Monetary and Capital Markets Department.

Source: IMF Blog

Continue Reading
Advertisement Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Opinion/White Papers

Balancing Growth with Affordability In Nigeria’s Telecom Industry

Published

on

, SiliconNigeria

By Elvis Eromosele

Today, Nigeria’s telecommunication industry stands at a crossroads. It is facing pressure on a thousand different fronts. On the inside, it is battling with the challenges of sustainable operations and shareholders demands and on the outside, raising costs and regulatory constraints. 

The Nigerian telecom industry has immense potential. The recently launched GSMA digital economy report made this point. It projects a rise of 15 million new internet users by 2028. It equally highlights the industry’s significant contribution to the nation’s GDP. 

Industry players, in the light of existing reality, have determined that a tariff increase will provide some succour and allow it to breathe. The Association of Licensed Telecom Operators of Nigeria (ALTON), an umbrella organisation for telecom and allied services providers, is at the forefront of the push for tariff increase.

ALTON argues that current tariffs, unchanged for over a decade, are insufficient to maintain operations and may indeed hinder vital investments in network infrastructure and possibly impact service quality. This assertion gains traction against a backdrop of foreign exchange losses, declining profits, and the increasingly challenging economic environment 

Within the same decade, electricity tariff was raised, at least, three times; the price of fuel has gone up by over 300 per cent and inflation has effectively climbed to over 33 per cent. Yet, operators’ demand for telecom tariff increases has sparked a contentious debate among industry stakeholders. For many, the crux of the matter is that the economy is already hard, so telcos should not compound things by increasing tariffs at this time. Economists will take a dim view of this argument. 

The telcos’ reason for pushing for tariff increases hinges on three main points. One, rising costs. Inflation, currency devaluation, increase in the pump price of fuel, electricity tariff increases and a general economic downturn have significantly increased operational expenses. The cost of maintaining and upgrading infrastructure, alongside acquiring foreign equipment, has outpaced current price structures.

The second is the investment challenges. Without a price adjustment reflecting economic realities, investors become hesitant. This stagnation in investment will limit the industry’s ability to expand networks, adopt new technologies like 5/6G and ultimately serve a growing population. The bulk of investment in the sector is dollar-denominated. 

Then thirdly, unsustainable business environment. The industry contends with a multitude of charges and levies (the perennial multiple taxation). ALTON reveals that there are over 45. This burden, coupled with a perceived lack of regulatory independence, creates an unfavourable business climate.

The government, however, has firmly rejected the proposal for a tariff hike. The NCC has refused to approve it. Bosun Tijani, Minister of Communications, Innovation and Digital Economy, emphasizes the need for a comprehensive solution. He argues that higher prices would disproportionately affect affordability and hinder inclusion, particularly for low-income Nigerians. This outcome will no doubt widen the digital disparity in the country.

In my mind, to move forward, we must be able to strike a balance between the financial viability of telecom companies and ensuring service affordability for consumers. This path likely involves a multi-pronged approach. 

We can start by reviewing the levy landscape. 45 is definitely too many. Reducing the number of charges levied on telecom operators could free up resources for investment. This can potentially create a more attractive business environment.

Secondly, regulation must be streamlined in line with global best practices. Experts concede that enhancing regulatory clarity and promoting an environment that encourages responsible risk-taking by investors would be crucial.

Moreover, operators have the option of exploring alternative revenue streams. This means that telecom companies can explore value-added services or targeted data packages to generate additional revenue without burdening core services.

The government is not left out. It must consider incentives. The federal government should as a matter of urgency consider targeted incentives that encourage network expansion and technological advancements. This will encourage operators to seek growth without solely relying on price hikes. The NCC must step up to the plate here.

At the heart of the debate lies the delicate balance between consumer affordability and industry sustainability. While tariff increases may alleviate financial strains for telecom operators, they also raise concerns about affordability and access for consumers, particularly in a country where digital inclusion remains a priority. 

To ensure that the telecom sector achieves its potential, we can’t play the ostrich anymore. Constructive dialogue and collaboration between government, industry stakeholders, and regulatory bodies are indispensable at this point. Adjustments must be made, if the sector is to maintain its contribution to Nigeria’s GDP, currently eight per cent, and thus continue to boost the broader ICT ecosystem growth.

By implementing cost-reflective tariffs, telecom companies can enhance their financial viability, enabling them to make essential investments in infrastructure, technology, and service quality. 

Eromosele, a corporate communication professional, writes via: [email protected]

Continue Reading

Opinion/White Papers

How Digital Marketing is Embracing the Ever-changing World of Work 

Published

on

, SiliconNigeria

By Gaston Taratuta, Founder and CEO of Aleph Group, Inc

The world of work has always changed and evolved in line with technological advances and major consumer shifts. Did you know, for example, that in Victorian Britain people were paid to wake factory workers up by tapping on their windows? Called knocker-uppers, they were a common sight until alarm clocks rendered them obsolete.. 

In recent months you may have seen articles predicting that, thanks to the rise of artificial intelligence (AI) tools such as ChatGPT, prompt engineering will become an important and necessary career skill in the near future. Some experts even suggest that the field, which boils down to giving AI tools the best possible inputs, is so critical that it may even become a career path in itself.   

But that’s just one example of where the world of work is headed. If you really want to future-proof yourself, it’s worth having a much broader view. And on that front, you could do a lot worse than keeping a close eye on the digital marketing sector. 

An industry unafraid of change 

Digital marketing has a long history of adapting and embracing big technological and societal shifts. From the early days of website banner ads through to innovative products on social media and streaming platforms, each advancement has required people in the sector to build up new skills to ensure that they’re providing the best possible service to their clients. 

That’s unlikely to change in the near future either. According to LinkedIn, the “Digital Marketing Specialist” role is among the top 10 most in-demand jobs, with 860 000 job openings. The fact that the most requested experience in digital marketing includes social media, content strategy, SEO, analytics, also shows how broad the field has become. 

Even those specific areas of experience are changing all the time. Take online communities, for example, before 2016, when the likes of Facebook and Twitter were well established, no one had any expertise in marketing on TikTok. Today, the platform has more than a billion users and is an increasingly important part of any organisation’s digital marketing strategy. As a result, people in digital marketing have had to build up the skills necessary to market on the platform. 

The same is true for every new product a social media platform launches. Twitter, Snapchat, Instagram, and Spotify, are all unique in its form. It’s also worth remembering that a user’s experience on TikTok has nothing to do with their experience on Twitter. You seldom meet someone who understands all the platforms very well. Additionally, there are changes all the time, so to be successful in digital marketing you have to be able to learn new things and be flexible all the time. 

These are also the qualities that you need to succeed in the rapidly changing world of work. 

Acquiring the right skills 

So, how should you go about acquiring the skills necessary to thrive in the world of digital marketing and beyond? 

There is no doubt that formal certification can be incredibly helpful, especially when you’re starting out on your journey. It’s part of why we launched our free Digital Ad Expert community. The 12 week course covers the basics of strategy and analytics, as well as platform specific advertising methodologies for all the major social media platforms. 

Once you have those basics in place though, self-exploration becomes critical. You have to be curious. You have to want to learn. You have to commit. By certifying yourself on all the platforms you can (this can usually be done for free). Learn things like Google Adwords, how to do marketing on Instagram, and as many other products as you can. 

Getting to that point won’t take long, for some people it can take as little as six months. From there, practice and keep practising. If you don’t have a client to practise on, market yourself. Soon enough you’ll learn that, in such a fast-changing world, years of experience matter less than your ability to deliver results. 

Powered by the present, ready for the future 

It’s something that’s been true of digital marketing for a while now. It’s also something that’s becoming increasingly true of the world of work in general. So, if you want to be ready to face the future, look to an industry that already has a strong track record of adapting to epoch-shifting changes. 

Continue Reading

Opinion/White Papers

Bridging the Gaps to Safeguard the Future of Hybrid Work

Published

on

, SiliconNigeria

By Emmanuel Asika, Country Head, HP Nigeria  

The emergence of cultures within adaptable working models that facilitate improved flexibility and therefore well-being whilst generating new range of opportunities to innovate and increase productivity shows that hybrid work is here to stay. A report by
Gartner shows a sizeable 51% of US knowledge workers are projected to work ‘hybrid’ and 20% to work fully remotely in 2023. Just as a Phillips Consulting (PCL) study reveals how Nigerian executives considered culture as one of the top factors to consider in their business strategy, moving from a 17% focus pre-COVID to a 44% focus in some cases to align with the future of work.  

Notably, these new dynamics signal new trajectories for security teams, as business protection is now more demanding because the path has become doubtful. To mitigate this, emphasis must be on protecting endpoints – PCs and printers; the ‘focal point’ of most attacks. Thus, to detect, prevent, and control cyber threats, new cybersecurity strategies are required; to dispel the threats associated with lost or stolen devices by boosting remote PC management.  

Mitigating security slips  

It’s clear that 82% of security experts adopting a hybrid work model have slip-ups in their organization’s security architecture, a new research and a hybrid security report from HP Wolf Security reveals. The epicenter of the hybrid worker’s world is the endpoint.  

In fact, 84% of security experts agree that endpoint is where the most enterprise-damaging cyber-threats occur, and it’s the root of most security threats – be it a PC, smartphone, laptop, tablet, or complementary peripherals like printers. For malicious attackers, these devices can be a target entry point.  

Nonetheless, local networks may be compromised and misconfigured. But truly, endpoints are the link bridging unprotected technologies and imperfect users. When devices are not provided with requisite routine enterprise protection, hybrid work models suffer and negatively affect productivity. Significantly, machines and employees working remotely are likely to be without appreciable protection and left vulnerable.  

Furthermore, some employees who are confined to their comfort zone without assistance of knowledgeable coworkers makes them more prone to either opening an attachment containing malware or clicking on a risky link. Employees likewise work in cafes, restaurants, and airports, and perhaps even living the digital nomad lifestyle abroad; they aren’t just working from home (WFH). Actually, two-thirds (66%i) of security leaders and IT experts consequently concluded that the most pronounced cybersecurity weakness in their organization is the possibility for hybrid employees to be compromised – phishing, ransomware, and attacks via unsafe home networks are also cited as top enterprise risks.  

Forward-thinking organizations now seem focused on fine investment in securing hybrid work, with a commendable four-fifths i.e., 82% of security leaders increasing budgets threshold specifically for hybrid workers, and 71%of these leaders expect this focus to increase further in 2023. Yet, the impact of their budget must be targeted at the appropriate tools with a concentration on positioning the endpoint front and center of any hybrid security strategy.  


Leaving no stone unturned  

An improved remote management of devices, despite its attendant complexities, is most necessary as most major considerations for the IT and security teams, in this hybrid age. Also, 70%i of security experts conclude that the risk of lost or stolen devices is prevalent in hybrid work. This triggers the question – when remote machines are powered down or offline, what happens? Locating or safeguarding data on these devices could be tasking, and substantially risky if they either contain confidential trade secrets, personally identifiable information (PII), or intellectual property (IP). The reality here is that Cloud Technologies have helped to reduce the workload here, but they’re not 100% effective.  

Human-error risk tendency is rife with itinerant workers always on the move; same way there will always be unethical hackers lurking around for susceptible devices they can attack. This trend raises risks, exclusively in highly regulated sectors like government – where a lost or stolen laptop could mean a
national security risk.  

Connecting with a fresh approach  

In Nigeria, an emerging economy, institutions are gradually deepening hybrid work models via infrastructure investments despite challenges of electricity, network coverage, low bandwidth, and affordability. HP has also been working on designing a model of
IT management connectivity solution hence, the new HP Wolf Connect service now enables IT to manage devices even when powered down or offline.  

So, for IT managers, what can they do to mitigate these concerns? Step one is to find a fresh approach to link remote computers over cellular networks. This implies that devices can be controlled even when turned off or offline. Fundamentally, such functionality could be deployed to connect with lost or stolen devices and then lock and wipe them. This approach will not only lower the risk of data leaks and violations, but it can also moderate IT expenses by cutting cases of PC replacement or remediation. A stronger and secure connection to remote computers also reduces the time and effort required to resolve support tickets. Teams can precisely report where and when devices went missing, and how long it took to lock or erase them. Now, that’s a fresh approach to security.  

About 80% of institutions laid claims to have deployed numerous tools and policies to protect hybrid working staff. However, what’s vital now is that these tools and policies require a paradigm shift from old perimeter-focused thinking. Once again, endpoint must become the focus for applying protection in the hybrid age. Accepting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be strategic for protecting end-users without impacting on the freedoms that hybrid work admits.  

This model should be part of an approach to hybrid workplace security that takes into consideration the distinct threats and contextual challenges that are more common with flexible working.  

Incidentally, about two-thirds, representing 61% of corporations and leaders, are saying that protection of their hybrid workforce will be harder moving forward. This doesn’t necessarily have to be the case. Enhanced remote management and the adoption of hardware-enforced security, can help businesses unleash end-user productivity without alluring extra cyber risks.  

Consequently, businesses should upgrade to a hybrid work model, at a time when sustainable growth is strategically significant to all organizations, bearing a fine blend of tech tools and motivated people to optimize lasting productivity. This is the future of work.

Continue Reading

Popular News