Business A.M
No Result
View All Result
Thursday, February 19, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

Insider threats: Overlooked but dangerous

by Admin
January 21, 2026
in Analyst Insight

Insider threats are one of the most underestimated risks in cybersecurity. While organisations often focus on external attacks, the reality is that the most devastating breaches often come from within. In the Nigerian and African markets, and even globally, insider threats remain a growing concern. These threats can come from careless employees, disgruntled staff, contractors, or even well-meaning individuals who compromise security.

 

A fintech startup in Lagos recently faced a major data breach after an employee fell for a phishing email. The email seemed to come from a trusted vendor, asking the employee to verify account details through a link. Believing it to be legitimate, the employee provided their login credentials, unknowingly granting cybercriminals access to sensitive customer data. The aftermath was severe, with customer trust eroded and regulatory penalties under the Nigeria Data Protection Regulation. This incident underscores the reality that insider threats often start with simple human error. Organisations need to prioritise regular cybersecurity awareness training, ensuring employees are equipped to recognise and resist phishing and other social engineering tactics.

 

In another case, a mid-sized retail company in South Africa suffered financial losses after a disgruntled former employee accessed its systems and leaked confidential contracts to competitors. Despite being terminated, the employee’s system access had not been revoked promptly. This negligence cost the company dearly, both in lost revenue and reputation. It is a stark reminder that offboarding processes must include immediate revocation of all access privileges. Organisations must also implement regular access reviews to prevent outdated credentials from becoming a liability.

 

Contractors and third-party vendors also pose significant insider threats. A telecom company in Kenya hired a contractor to manage customer data but failed to enforce strict data governance measures. The contractor accessed the database and sold personal information, including customer names, phone numbers, and payment histories, to third parties. The fallout included customer complaints, public outcry, and regulatory scrutiny. This scenario highlights the importance of robust third-party management, including clearly defined contracts, access controls, and regular audits.

 

Not all insider threats stem from malicious intent. In a multinational organisation with African operations, a senior manager unintentionally caused a major data breach by transferring sensitive customer information to a personal device to work from home. The device, lacking encryption, was lost, resulting in a leak that triggered legal and regulatory consequences, particularly in jurisdictions like the EU under GDPR. This incident illustrates how even well-intentioned actions can have dire consequences. Companies must establish and enforce clear policies on data handling, implement encryption tools, and restrict the transfer of sensitive information to personal devices.

 

Privileged access mismanagement is another recurring theme. In one Nigerian oil and gas company — not to mention any company name — a junior IT staff member exploited administrative privileges to share trade data with competitors. Investigations revealed lax oversight of privileged accounts and poorly defined access controls. This failure points to the critical need for organisations to adopt the principle of least privilege, ensuring that employees only have access to the systems and data necessary for their roles. Regular monitoring and auditing of privileged accounts can prevent such scenarios.

 

Insider threats demand a proactive and layered approach to cybersecurity. Organisations must establish clear policies, invest in employee training, enforce strict access controls, and monitor activity within their systems. The consequences of failing to address insider threats are often severe, not just in terms of financial losses but also in reputational damage and regulatory penalties. By recognising and addressing these risks, businesses across Nigeria, Africa, and globally can better protect their assets and build trust in an increasingly digital world.

 

  • business a.m. commits to publishing a diversity of views, opinions and comments. It, therefore, welcomes your reaction to this and any of our articles via email: comment@businessamlive.com 

 

Admin
Admin
Previous Post

Capitalism Is Driving Democracy’s Death Spiral

Next Post

Sustainability in aviation

Next Post

Sustainability in aviation

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026
NGX taps tech advancements to drive N4.63tr capital growth in H1

Insurance-fuelled rally pushes NGX to record high

August 8, 2025

Reps summon Ameachi, others over railway contracts, $500m China loan

July 29, 2025

CBN to issue N1.5bn loan for youth led agric expansion in Plateau

July 29, 2025

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

CMAN calls oil revenue reform key to investor confidence recovery

CMAN calls oil revenue reform key to investor confidence recovery

February 19, 2026
Zoho targets Africa expansion after 30 years with self-funded growth strategy

Zoho targets Africa expansion after 30 years with self-funded growth strategy

February 19, 2026
GSMA presses telecoms to rethink business models for trillion-dollar B2B growth

GSMA urges rethink of spectrum policy to close rural digital divide

February 19, 2026
Unilever, Google Cloud partnership raises stakes in consumer goods digital transformation race

Unilever, Google Cloud partnership raises stakes in consumer goods digital transformation race

February 18, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • Insurance-fuelled rally pushes NGX to record high

    0 shares
    Share 0 Tweet 0
  • Reps summon Ameachi, others over railway contracts, $500m China loan

    0 shares
    Share 0 Tweet 0
  • CBN to issue N1.5bn loan for youth led agric expansion in Plateau

    0 shares
    Share 0 Tweet 0
  • How UNESCO got it wrong in Africa

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

CMAN calls oil revenue reform key to investor confidence recovery

CMAN calls oil revenue reform key to investor confidence recovery

February 19, 2026
Zoho targets Africa expansion after 30 years with self-funded growth strategy

Zoho targets Africa expansion after 30 years with self-funded growth strategy

February 19, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M