OP-ED: Building a Robust Cybersecurity Readiness For Africa’s Digital Future

Not only is Africa suffering from thousands of cyberattacks, but it is also the region with the highest weekly average on earth. The global average is 1,636 attacks per week.
This rapid digital transformation increases the need for robust cybersecurity in African economies. The threat is real. COURTESY PHOTO This rapid digital transformation increases the need for robust cybersecurity in African economies. The threat is real. COURTESY PHOTO
This rapid digital transformation increases the need for robust cybersecurity in African economies. The threat is real. COURTESY PHOTO

An average of 2,960 attacks is the number of cyberattacks the average African organization is subjected to every week. It’s a staggering number and rapidly growing every year. According to Checkpoint Research, this year’s number was up 37% from the year before.

Not only is Africa suffering from thousands of cyberattacks, but it is also the region with the highest weekly average on earth. The global average is 1,636 attacks per week.

Cyberattacks are now part and parcel of the business landscape —and Africa is a major target. Given the sheer scale of the problem, cybersecurity is a fundamental requirement for any business, NGO, or government entity trying to operate on the continent.

Cyber vulnerabilities

What makes Africa particularly vulnerable is the continent’s lack of infrastructure and resources due to budget limitations; a lack of awareness of the truly critical nature of the problem; legislative and policy lethargy; and a continuing shortage of trained cybersecurity professionals.

Another vulnerability is the continent’s youthful population. While an enormous asset, having a young population also comes with risks.  According to the United Nations, 70% of Africa’s population is under 30, and that youth component is growing. The youth often lack financial resources and become accustomed to compromising their cybersecurity to access connectivity through sharing devices, connecting to wi-fi in public places, or using unencrypted connections.

Another risk is that the youth-focused education sector has become the industry suffering the most cyberattacks. This is partly due to the rise in online education since the Covid-19 pandemic. Education and research institutions are also often prime targets for cybercriminals, due to the sensitive information they hold and the fact that remote education involves multiple groups of online users.

Also read:

Content piracy

Young people are also enthusiastic users of entertainment content. This may make them more willing to seek out pirated content, which comes with significant risks —malware, ransomware, fraud, and identity theft, to name just a few. These risks have seen the rise of the Partners Against Piracy initiative, with entertainment group MultiChoice Africa and cybersecurity firm Irdeto —a pan-African coalition to fight content piracy.

This anti-piracy initiative has made significant strides, with Irdeto and other key stakeholders conducting around 155 raids across Africa this year; and 4,351 pirate-content networks having been closed down.

Africa’s Police and court systems are also combating content piracy. Cybercrime legislation has been updated in Nigeria, Kenya, and Tanzania, and 107 arrests have been made across Africa this year.

Despite the risk of piracy in youth-culture channels, Africa’s youth dividend is a significant advantage as the world embraces connected, digital economies. The GSMA predicts that by 2030, Africa will have 438 million mobile internet users —a cohort of savvy, digital natives, ready to work and do business online.

This rapid digital transformation increases the need for robust cybersecurity in African economies. The threat is real. In 2023, Checkpoint found only seven African countries ranked among the top 50 for cybersecurity readiness.

See also: ITU Secretary-General, Doreen Bogdan-Martin applauds Uganda’s digital transformation roadmap

Boosting resilience

Increasing Africa’s resilience against cyber threats will require initiatives on several fronts.

  • Awareness and education: It’s critical to build cybersecurity education into school curriculums corporate training programs and public awareness campaigns.
  • Investment: Cybersecurity is a sophisticated, specialized area, best managed by experts with relevant, up-to-the-minute skills. Organizations must budget to enlist these experts to build robust cybersecurity frameworks.
  • Legislation: Cybersecurity considerations must be integrated into policies to ensure that cyber-resilience is legislated, and cyber criminals are prosecuted and jailed. This requires international, cross-sectoral cooperation.
  • Infrastructure protection: Cybersecurity requires information security infrastructure, a massive weakness in Africa. Reports show that 90% of African businesses operate without comprehensive cybersecurity protocols. Inadequate or outdated infrastructure limits their ability to detect, prevent, and respond effectively to cyberattacks.
  • Public-private partnerships: The private sector has cybersecurity expertise and agile industry knowledge. Governments have budgets and policy strengths to get things done. A co-ordinated, partnership approach is the ideal way to unlock these respective competencies for everyone’s benefit.

National functions like health, education, social services, and justice depend on digital platforms. Neglecting cybersecurity places the delivery of all these services at risk. On the upside, future careers will increasingly rely on digital skills and platforms. These platforms must be secured if Africa’s people are going to be able to build businesses, campaigns, and other initiatives in the digital space.

See also: OP-ED: Time to empower Gen Z for the burgeoning tech and digital careers

As a continent, we cannot afford to ignore the importance of building cyber-resilience to secure the future of Africa’s people.

Editor’s Note: Frikkie Jonker, a Broadcasting Cybersecurity Anti-Piracy Director at Irdeto, writes the article

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *