Business A.M
No Result
View All Result
Monday, February 16, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

GRC, cybersecurity intersection for curbing cybercrimes menace

by Admin
July 29, 2025
in Analyst Insight

The word cyber and its relative dot.com are probably the most frequently used lexica of the modern era. In the information age, the rapid development of computers, telecommunications and other technologies has led to the progression of new forms of trans-national crimes known as “cybercrimes”.

Cybercrimes have virtually no boundaries and may affect every country in the world. They may be defined as “any crime with the help of computer and telecommunication technology”, with the purpose of influencing the functioning of computer or the computer systems.

According to Wikipedia,  Cybercrimes are “offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)”.

On 28 November 2019, it was widely reported that Nigeria lost N250 billion to cybercrime in 2018; that number has been increasing over time. Ghana also lost $77milion the same year.

Prof. Umar Garba Danbatta, executive vice chairman of the Nigerian Communications Commission, was quoted in June 2019 to have said that Nigerian banks were helpless in curbing cybercrime which is now growing ubiquitous in the country.

Worldwide cybercrime costs an estimated $600 billion USD a year. That’s up from $500 billion USD in 2014, the last time security vendor McAfee and think tank the Center for Strategic and International Studies released a similar study. The new estimate amounts to 0.8 percent of global GDP, up from 0.7 percent in 2014.

The extent of loss involved worldwide of cybercrimes is tremendous as it is estimated that about 500 million people who use the Internet can be affected by the emergence of cybercrimes.

The possible underlying factors linked to increases in cybercrime are shown in the figure below: dissociative anonymity, criminal social learning, etc.

At the same time, among the reasons for the growth in the cost of cybercrime are:

• Cybercriminals are embracing new attack technologies;

• Many new Internet users come from countries with weak cybersecurity;

• Online crime is becoming easier through cybercrime-as-a-service and other business schemes; and

• Cybercriminals are becoming more financially sophisticated, making it easier to monetize their exploits.

Recently, cybercriminals have been demonstrating that their activities are becoming more about financial gains and recognition, rather than revenge. Although this was always a motivation [after all, one of the easiest ways to make money is to get hold of personal records and sell them on the dark web] we’re now seeing a notable increase of attacks for this purpose.

Cybercrimes are a very serious threat for the times to come and pose one of the most difficult challenges before the law enforcement machinery. Most cybercrimes do not involve violence but rather greed, pride, or play on some character weakness of the victims.

Cybercrime involves using computers and Internet by individuals to commit crime. They can be classified as cyberterrorism;Cyberextortion; cyberwarfare; computer as a target; computer as a tool; obscene or offensive content; online harassment; drug trafficking.

Identification theft, fraudulent online transfers, payment-card frauds, network assaults, denial-of-service attacks by malicious networks of computers (botnets), ransomware, cyberbullying, trolling and online child pornography are  all common forms of Cybercrimes..

They show that nothing is safe on the internet – apart from criminals, it seems. It is incredibly difficult to protect computers, networks and the internet from vandals, pranksters, criminals, terrorists, rogue governments and government-protected agents because networks are too widely used, too complex, too fragmented and too vulnerable to coding mistakes, ignorance and complacency, and too open to be defended.

It’s no misrepresentation: any organization can become a victim of cybercrime. Smart organizations are putting more in cyber security.

A well-planned GRC strategy supported with a GRC platform enables several benefits in the fight against cybercrimes: Improved Decision Making, Higher Quality Information, increased accountability, Increased Collaboration, Enhanced Organizational Culture, Increased Efficiency, Increased Agility, Increased Visibility, Protected Reputation, Better Resource Allocation, Reduced Costs with Optimal Investment Decisions, Reduced Fragmentation within Organization and Preserved Institutional Memory.

Cyber Security is one of the main domains of GRC and Chief Information Security Officers [CISOs] are often the biggest champions of GRC Implementations worldwide.

GRC utilizes approaching security activities in a mature way and enhances the likelihood of achieving security objectives by aligning processes that support each other in the greater context of the security organization.

GRC also enables a company to foster a security organization that is well-coordinated and integrated. If applied well, GRC forms three basic pillars of organizational control to support effective Information Security Management System [ISMS].

However, when it comes to cybersecurity, issues arise if it is expected that the same level of security data and log traffic required by security analysts will also properly serve the needs of managers and risk owners.

These issues can become worse if the focus is one of compliance to a particular standard at a particular point in time.

GRC cybersecurity within the ISMS is like any other risk– it needs to be proactively managed. This means identifying, understanding and managing that risk more effectively for all stakeholders. If we are to improve our operational attitude, we need to consider GRC cybersecurity tools as enablers.

Where applied to cybersecurity, GRC can deliver significant benefits especially when we consider the challenge of monitoring data creation and movement at speeds and scales that would have been unthinkable just a few years ago.

GRC cybersecurity can bond the Information security management system into the organization at all levels, so the relevance of any change in the technological status is known for both its security and business impact.

Business stakeholders need security GRC information and feedback to be translated into a language they can understand and a form that they can act upon. Since cybersecurity is such an important factor in governance there are many different areas where GRC and cybersecurity intersect.

Data Privacy: This is one of the main drivers in increasing the importance of GRC in cybersecurity. Over the past few years, there have been extensive regulations and new strategies applied all over the world for data privacy.

Risk:  The link between cybersecurity and risk should not be ignored. Cybersecurity risks are an important factor in the overall risk exposure of the organization. Any organization that does not have sophisticated data security measures in place will not be able to manage risk.

The New Approach:  Organizations need a better approach when it comes to cybersecurity. One solution is to understand the importance of GRC knowledge for people in charge of cybersecurity. Cybersecurity personnel in the financial industry are required to know the legal and regulatory requirements of their organizations, and the same approach needs to extend to other industries as well.

A GRC cybersecurity platform is important for organizations that are only now bringing together cybersecurity and GRC. The platform will make the transition into the new model smoother and will also aid employees.

Cybersecurity GRC makes the whole business process more secure. Antivirus software and firewalls can catch the viruses and attacks that are coming in through vulnerabilities in the IT infrastructure; GRC can eliminate these vulnerabilities completely.

Previous Post

The Neuroscience Behind What the Crowd Thinks

Next Post

What Elite Museums Can Teach Us About Running a Creative Business

Next Post

What Elite Museums Can Teach Us About Running a Creative Business

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026
SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

February 10, 2026

Reps summon Ameachi, others over railway contracts, $500m China loan

July 29, 2025
NGX taps tech advancements to drive N4.63tr capital growth in H1

Insurance-fuelled rally pushes NGX to record high

August 8, 2025

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

AfriGO cards launch on PalmPay app as Nigeria pushes domestic payments adoption

AfriGO cards launch on PalmPay app as Nigeria pushes domestic payments adoption

February 15, 2026
Credit constraints, price volatility cloud agribusiness outlook

Credit constraints, price volatility cloud agribusiness outlook

February 15, 2026
Bedrock Residences appoints Kofo Ati-John as chairman

Bedrock Residences appoints Kofo Ati-John as chairman

February 14, 2026
Nigerian Breweries rated ‘buy’ as analysts see stronger earnings demand driving recovery

Nigerian Breweries returns to profitability with N99bn net income

February 14, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

    0 shares
    Share 0 Tweet 0
  • Reps summon Ameachi, others over railway contracts, $500m China loan

    0 shares
    Share 0 Tweet 0
  • Insurance-fuelled rally pushes NGX to record high

    0 shares
    Share 0 Tweet 0
  • What’s Behind the Fourth-Quarter Earnings Dip?

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

AfriGO cards launch on PalmPay app as Nigeria pushes domestic payments adoption

AfriGO cards launch on PalmPay app as Nigeria pushes domestic payments adoption

February 15, 2026
Credit constraints, price volatility cloud agribusiness outlook

Credit constraints, price volatility cloud agribusiness outlook

February 15, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M