African Governments urged to enact policies to protect critical infrastructure from cyber attacks
By Nana Appiah Acquaye, Accra, Ghana
Cyber Security Specialist at Rolls-Royce Boakye Dankwa has urged African governments to enact appropriate policies to protect the privacy of their citizens and secure critical infrastructure from cyber attacks.
According to him with the dependence of most African countries on computer systems, it has become imperative for governments to do more on the policy and technical side to improve cyber security.
Speaking exclusively to Biztechafrica, Mr. Dankwa noted how advanced countries in the developed world are devoting millions of dollars to research and development in defenses against cyber threats, and said African leaders could emulated such progressive initiative to enable them protect their systems which are extremely crucial to critical institutions in governments and infrastructure.
“Cyber security is extremely important these days. Computer systems are ubiquitous in all aspects of our lives. Protecting these systems is not only important to individuals like me and you but extremely crucial to critical institutions in like our governments and critical infrastructure,” he averred.
Whilst encouraging African governments to take steps in promoting Research and Development in defenses against cyber threats, Mr. Boakye Dankwa said he believed that individuals and corporate institutions on the continent had important roles to play in cyber security.
“Individuals need to take appropriate measures such as antivirus and basic cyber hygiene to protect their data and privacy. Private institutions need to protect their confidential data, IP and network from hackers,” he said.
Cyber attacks according to an award winning Pan-African based Cybersecurity and Business consulting firm, Serianu cost African businesses USD 3.5 Billion. It revealed that further analysis of cost of Cybercrime for countries including Nigeria, Kenya, Ghana, Uganda and Tanzania was estimated at USD$ 1.078 Billion a year which includes direct damages and loss, post-attack disruption to the normal course of business and reputational loss.
Recent Information Security News
The dark side of apps21 Aug