The moment has arrived: last week the Protection of Personal Information Act (PoPIA) came into force. It hasn’t been sprung on us, the process has been ongoing and businesses have been anticipating their compliance obligations for years. PoPIA, much like the General Data Protection Regulation (GDPR) in the EU, exists to support the protection of personal information processed by public and private organisations. There are strong penalties for noncompliance. PoPIA is Live Now that the Act is live, there are several ramifications for businesses, but a few – anecdotally at least – have given executives more sleepless nights than others. Companies must allow data subjects to object to their data being processed, as well as have the right to revoke previously given consent at any time. When a c...
The Peoples Democratic Party (PDP) has congratulated Gov. Godwin Obaseki of Edo State as he marks his 64th birthday. The party, in a statement by its National Publicity Secretary, Mr Kola Ologbondiyan, in Abuja on Thursday described Obaseki as a courageous leader. He also described him as a brilliant technocrat, highly resourceful and ingenious administrator. The party spokesman said that Obaseki had continued to exhibit an exceptional commitment towards the unity, stability and development of not only Edo State but the nation at large. Ologbondiyan said that the PDP was proud of the outstanding achievements recorded by Obaseki in the development of Edo State, particularly in the critical sectors, in line with the manifesto of the party. The sectors, according to him, include infrastructur...
Image sourced from Software ONE. Increasingly companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses of the future. However, as reliance on autonomous and digital technology grows, so too does the risk of cyber-attacks. As technologies become more interconnected, the potential cybersecurity threats and attack vectors are growing. The consequences of these threats can be severe, resulting in production and revenue losses, regulatory fines, reputational damage, as well as the shutdown of critical infrastructures. This has been further compounded by the complexities and uptake of smart systems that use advanced technologies such as machine learning and the Internet of Things (IoT). Mining, Manufacturing Under Threat Termed ‘S...
Image sourced from Shutterstock. As the global workforce largely shifted to work-from-home in response to the COVID-19 pandemic, reliance on online services soared. Many businesses were able to successfully pivot to this new normal as remote connectivity allowed access to vital systems and data. But as is often the case, no good deed goes unpunished. As the latest NETSCOUT Threat Intelligence Report shows, cybercriminals have exploited new vulnerabilities created by remote work across a wide variety of vertical industries. Making matters worse, perpetrators no longer have to be particularly technology-savvy in order to pull off attacks. Today, it is easy and relatively inexpensive to access sophisticated attack tools via for-hire services: A cottage industry has sprung ...