Business A.M
No Result
View All Result
Tuesday, March 10, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

GRC, cybersecurity intersection for curbing cybercrimes menace

by Admin
July 29, 2025
in Analyst Insight

The word cyber and its relative dot.com are probably the most frequently used lexica of the modern era. In the information age, the rapid development of computers, telecommunications and other technologies has led to the progression of new forms of trans-national crimes known as “cybercrimes”.

Cybercrimes have virtually no boundaries and may affect every country in the world. They may be defined as “any crime with the help of computer and telecommunication technology”, with the purpose of influencing the functioning of computer or the computer systems.

According to Wikipedia,  Cybercrimes are “offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)”.

On 28 November 2019, it was widely reported that Nigeria lost N250 billion to cybercrime in 2018; that number has been increasing over time. Ghana also lost $77milion the same year.

Prof. Umar Garba Danbatta, executive vice chairman of the Nigerian Communications Commission, was quoted in June 2019 to have said that Nigerian banks were helpless in curbing cybercrime which is now growing ubiquitous in the country.

Worldwide cybercrime costs an estimated $600 billion USD a year. That’s up from $500 billion USD in 2014, the last time security vendor McAfee and think tank the Center for Strategic and International Studies released a similar study. The new estimate amounts to 0.8 percent of global GDP, up from 0.7 percent in 2014.

The extent of loss involved worldwide of cybercrimes is tremendous as it is estimated that about 500 million people who use the Internet can be affected by the emergence of cybercrimes.

The possible underlying factors linked to increases in cybercrime are shown in the figure below: dissociative anonymity, criminal social learning, etc.

At the same time, among the reasons for the growth in the cost of cybercrime are:

• Cybercriminals are embracing new attack technologies;

• Many new Internet users come from countries with weak cybersecurity;

• Online crime is becoming easier through cybercrime-as-a-service and other business schemes; and

• Cybercriminals are becoming more financially sophisticated, making it easier to monetize their exploits.

Recently, cybercriminals have been demonstrating that their activities are becoming more about financial gains and recognition, rather than revenge. Although this was always a motivation [after all, one of the easiest ways to make money is to get hold of personal records and sell them on the dark web] we’re now seeing a notable increase of attacks for this purpose.

Cybercrimes are a very serious threat for the times to come and pose one of the most difficult challenges before the law enforcement machinery. Most cybercrimes do not involve violence but rather greed, pride, or play on some character weakness of the victims.

Cybercrime involves using computers and Internet by individuals to commit crime. They can be classified as cyberterrorism;Cyberextortion; cyberwarfare; computer as a target; computer as a tool; obscene or offensive content; online harassment; drug trafficking.

Identification theft, fraudulent online transfers, payment-card frauds, network assaults, denial-of-service attacks by malicious networks of computers (botnets), ransomware, cyberbullying, trolling and online child pornography are  all common forms of Cybercrimes..

They show that nothing is safe on the internet – apart from criminals, it seems. It is incredibly difficult to protect computers, networks and the internet from vandals, pranksters, criminals, terrorists, rogue governments and government-protected agents because networks are too widely used, too complex, too fragmented and too vulnerable to coding mistakes, ignorance and complacency, and too open to be defended.

It’s no misrepresentation: any organization can become a victim of cybercrime. Smart organizations are putting more in cyber security.

A well-planned GRC strategy supported with a GRC platform enables several benefits in the fight against cybercrimes: Improved Decision Making, Higher Quality Information, increased accountability, Increased Collaboration, Enhanced Organizational Culture, Increased Efficiency, Increased Agility, Increased Visibility, Protected Reputation, Better Resource Allocation, Reduced Costs with Optimal Investment Decisions, Reduced Fragmentation within Organization and Preserved Institutional Memory.

Cyber Security is one of the main domains of GRC and Chief Information Security Officers [CISOs] are often the biggest champions of GRC Implementations worldwide.

GRC utilizes approaching security activities in a mature way and enhances the likelihood of achieving security objectives by aligning processes that support each other in the greater context of the security organization.

GRC also enables a company to foster a security organization that is well-coordinated and integrated. If applied well, GRC forms three basic pillars of organizational control to support effective Information Security Management System [ISMS].

However, when it comes to cybersecurity, issues arise if it is expected that the same level of security data and log traffic required by security analysts will also properly serve the needs of managers and risk owners.

These issues can become worse if the focus is one of compliance to a particular standard at a particular point in time.

GRC cybersecurity within the ISMS is like any other risk– it needs to be proactively managed. This means identifying, understanding and managing that risk more effectively for all stakeholders. If we are to improve our operational attitude, we need to consider GRC cybersecurity tools as enablers.

Where applied to cybersecurity, GRC can deliver significant benefits especially when we consider the challenge of monitoring data creation and movement at speeds and scales that would have been unthinkable just a few years ago.

GRC cybersecurity can bond the Information security management system into the organization at all levels, so the relevance of any change in the technological status is known for both its security and business impact.

Business stakeholders need security GRC information and feedback to be translated into a language they can understand and a form that they can act upon. Since cybersecurity is such an important factor in governance there are many different areas where GRC and cybersecurity intersect.

Data Privacy: This is one of the main drivers in increasing the importance of GRC in cybersecurity. Over the past few years, there have been extensive regulations and new strategies applied all over the world for data privacy.

Risk:  The link between cybersecurity and risk should not be ignored. Cybersecurity risks are an important factor in the overall risk exposure of the organization. Any organization that does not have sophisticated data security measures in place will not be able to manage risk.

The New Approach:  Organizations need a better approach when it comes to cybersecurity. One solution is to understand the importance of GRC knowledge for people in charge of cybersecurity. Cybersecurity personnel in the financial industry are required to know the legal and regulatory requirements of their organizations, and the same approach needs to extend to other industries as well.

A GRC cybersecurity platform is important for organizations that are only now bringing together cybersecurity and GRC. The platform will make the transition into the new model smoother and will also aid employees.

Cybersecurity GRC makes the whole business process more secure. Antivirus software and firewalls can catch the viruses and attacks that are coming in through vulnerabilities in the IT infrastructure; GRC can eliminate these vulnerabilities completely.

Admin
Admin
Previous Post

The Neuroscience Behind What the Crowd Thinks

Next Post

What Elite Museums Can Teach Us About Running a Creative Business

Next Post

What Elite Museums Can Teach Us About Running a Creative Business

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026

How UNESCO got it wrong in Africa

May 30, 2017

CBN to issue N1.5bn loan for youth led agric expansion in Plateau

July 29, 2025

Glo, Dangote, Airtel, 7 others prequalified to bid for 9Mobile acquisition

November 20, 2017

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

Another deferred hope agenda in Nigeria’s national assets sale

Oil windfall expectations from the Middle East crisis

March 9, 2026
Nigeria Markets, like Chinatowns, can drive non-oil export expansion

Nigeria Markets, like Chinatowns, can drive non-oil export expansion

March 9, 2026
An unforgettable lesson from Entebbe Zoo

How a £5 valentine risk paid off

March 9, 2026
Stress-testing systems:A financial imperative, not technical exercise

Nigeria’s “gone-away customers”: A data governance crisis hiding ₦20trn

March 9, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • How UNESCO got it wrong in Africa

    0 shares
    Share 0 Tweet 0
  • CBN to issue N1.5bn loan for youth led agric expansion in Plateau

    0 shares
    Share 0 Tweet 0
  • Glo, Dangote, Airtel, 7 others prequalified to bid for 9Mobile acquisition

    0 shares
    Share 0 Tweet 0
  • Elumelu leads corporate mourning after UBA staff die in Afriland Towers fire

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

Another deferred hope agenda in Nigeria’s national assets sale

Oil windfall expectations from the Middle East crisis

March 9, 2026
Nigeria Markets, like Chinatowns, can drive non-oil export expansion

Nigeria Markets, like Chinatowns, can drive non-oil export expansion

March 9, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M