{"id":42274,"date":"2022-06-01T18:26:43","date_gmt":"2022-06-01T18:26:43","guid":{"rendered":"https:\/\/www.msmehub.org\/?p=42274"},"modified":"2022-06-01T18:26:43","modified_gmt":"2022-06-01T18:26:43","slug":"cyber-attacks-what-why-how","status":"publish","type":"post","link":"https:\/\/msmehub.org\/staging\/6671\/cyber-attacks-what-why-how\/","title":{"rendered":"Cyber-attacks: What, Why &#038; How"},"content":{"rendered":"<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">In Q4 of 2021, there were an astonishing 1,353 cyber-attacks weekly in Africa, in comparison to an average of 925 cyber-attacks in the world.\u00a0<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Cyber-attack is a form of digital assault using computers, networks, or devices with access to the internet; directed towards other computers, networks, or devices with access to the internet which threatens public safety, national security, and economic security. Cybercriminals usually compromise systems and steal financial, property, and\/or intellectual property such as business or customer financial details, sensitive personal identifying information, customer\/employee emails, databases, and so on.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As internet penetration is increasing, and more and more people are interconnected through the digital world, there is an increase in cyber-attacks. Examples of typical cyber-attacks are email compromise, identity theft, ransomware, phishing, online predators, and espionage. These attacks damage computer hardware and network, give unauthorized access to data, and in some cases physically harm people.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to protect your business or yourself, it is important to have a comprehensive security plan and infrastructure that offers protection. Out of 182 countries, Nigeria ranks 47th on the 2020 Global Cybersecurity Index with about 84.76% of measures taken to ensure protection. Mauritius, the highest-ranked in Africa and the 7th ranked in the world, has taken about 96.89% of measures to ensure protection.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what exactly can be done to protect yourself?<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use strong passwords that are reviewed and changed at least quarterly\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Update your software frequently and\/or have automatic updates activated\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Turn on and use multi-factor authentication<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Apply firewalls and IPS<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have segmented networks<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be cautious before you click on links or download attachments\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Most importantly educate yourself, your family, colleagues about cybersecurity<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Most cyberattacks come from email compromise, if the email sounds too good to be true, it probably is, therefore do not click nor download, just hit delete.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact<\/span><a href=\"http:\/\/versa-research.com\"> <span style=\"font-weight: 400;\">Versa Research<\/span><\/a><span style=\"font-weight: 400;\"> your trusted data, research &amp; consulting partner!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">References<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/techpoint.africa\/newsletter\/techpoint-digest-236\/?utm_source=mailster&amp;utm_medium=email&amp;utm_term&amp;utm_content&amp;utm_campaign=techpoint Africa digest<\/span><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/preview.mailerlite.com\/t8e9n4e2t5\/1862154675466279540\/l5f7\/<\/span><\/p>\n<p><a href=\"https:\/\/www.fbi.gov\/investigate\/cyber\"><span style=\"font-weight: 400;\">https:\/\/www.fbi.gov\/investigate\/cyber<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.ibm.com\/topics\/cyber-attack\"><span style=\"font-weight: 400;\">https:\/\/www.ibm.com\/topics\/cyber-attack<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.nibusinessinfo.co.uk\/content\/reasons-behind-cyber-attacks\"><span style=\"font-weight: 400;\">https:\/\/www.nibusinessinfo.co.uk\/content\/reasons-behind-cyber-attacks<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/guardian.ng\/technology\/nigeria-lags-behind-mauritius-ghana-others-in-cybersecurity-ranking\/<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Q4 of 2021, there were an astonishing 1,353 cyber-attacks weekly in Africa, in comparison to an average of 925 cyber-attacks in the world.\u00a0 Cyber-attack is a form of digital assault using computers, networks, or devices with access to the internet; directed towards other computers, networks, or devices with access to the internet which threatens public safety, national security, and economic security. Cybercriminals usually compromise systems and steal financial, property, and\/or intellectual property such as business or customer financial details, sensitive personal identifying information, customer\/employee emails, databases, and so on.\u00a0 As internet penetration is increasing, and more and more people are interconnected through the digital world, there is an increase in cyber-attacks. Examples of typical cyber-attacks are email compromise, identity theft, ransomware, phishing, online predators, and espionage. These attacks damage computer hardware and network, give unauthorized access to data, and in some cases physically harm people.\u00a0 In order to protect your business or yourself, it is important to have a comprehensive security plan and infrastructure that offers protection. Out of 182 countries, Nigeria ranks 47th on the 2020 Global Cybersecurity Index with about 84.76% of measures taken to ensure protection. Mauritius, the highest-ranked in Africa and the 7th ranked in the world, has taken about 96.89% of measures to ensure protection.\u00a0 So what exactly can be done to protect yourself? Use strong passwords that are reviewed and changed at least quarterly\u00a0 Update your software frequently and\/or have automatic updates activated\u00a0 Turn on and use multi-factor authentication Apply firewalls and IPS Have segmented networks Be cautious before you click on links or download attachments\u00a0 Most importantly educate yourself, your family, colleagues about cybersecurity Most cyberattacks come from email compromise, if the email sounds too good to be true, it probably is, therefore do not click nor download, just hit delete.\u00a0 Contact Versa Research your trusted data, research &amp; consulting partner! References https:\/\/techpoint.africa\/newsletter\/techpoint-digest-236\/?utm_source=mailster&amp;utm_medium=email&amp;utm_term&amp;utm_content&amp;utm_campaign=techpoint Africa digest https:\/\/preview.mailerlite.com\/t8e9n4e2t5\/1862154675466279540\/l5f7\/ https:\/\/www.fbi.gov\/investigate\/cyber https:\/\/www.ibm.com\/topics\/cyber-attack https:\/\/www.nibusinessinfo.co.uk\/content\/reasons-behind-cyber-attacks https:\/\/guardian.ng\/technology\/nigeria-lags-behind-mauritius-ghana-others-in-cybersecurity-ranking\/<\/p>\n","protected":false},"author":1235,"featured_media":42302,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[366,348,303],"tags":[1425,1430,1429,1431,1426,1428,1427],"class_list":["post-42274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-for-startups","category-operations","category-start-up-basics","tag-cyberattacks","tag-data-privacy","tag-data-protection","tag-digital-assualt","tag-online-protection","tag-security-infrastructure","tag-security-plan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-attacks: What, Why &amp; How<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-attacks: What, Why &amp; How\" \/>\n<meta property=\"og:description\" content=\"In Q4 of 2021, there were an astonishing 1,353 cyber-attacks weekly in Africa, in comparison to an average of 925 cyber-attacks in the world.\u00a0 Cyber-attack is a form of digital assault using computers, networks, or devices with access to the internet; directed towards other computers, networks, or devices with access to the internet which threatens public safety, national security, and economic security. Cybercriminals usually compromise systems and steal financial, property, and\/or intellectual property such as business or customer financial details, sensitive personal identifying information, customer\/employee emails, databases, and so on.\u00a0 As internet penetration is increasing, and more and more people are interconnected through the digital world, there is an increase in cyber-attacks. Examples of typical cyber-attacks are email compromise, identity theft, ransomware, phishing, online predators, and espionage. These attacks damage computer hardware and network, give unauthorized access to data, and in some cases physically harm people.\u00a0 In order to protect your business or yourself, it is important to have a comprehensive security plan and infrastructure that offers protection. Out of 182 countries, Nigeria ranks 47th on the 2020 Global Cybersecurity Index with about 84.76% of measures taken to ensure protection. Mauritius, the highest-ranked in Africa and the 7th ranked in the world, has taken about 96.89% of measures to ensure protection.\u00a0 So what exactly can be done to protect yourself? Use strong passwords that are reviewed and changed at least quarterly\u00a0 Update your software frequently and\/or have automatic updates activated\u00a0 Turn on and use multi-factor authentication Apply firewalls and IPS Have segmented networks Be cautious before you click on links or download attachments\u00a0 Most importantly educate yourself, your family, colleagues about cybersecurity Most cyberattacks come from email compromise, if the email sounds too good to be true, it probably is, therefore do not click nor download, just hit delete.\u00a0 Contact Versa Research your trusted data, research &amp; consulting partner! References https:\/\/techpoint.africa\/newsletter\/techpoint-digest-236\/?utm_source=mailster&amp;utm_medium=email&amp;utm_term&amp;utm_content&amp;utm_campaign=techpoint Africa digest https:\/\/preview.mailerlite.com\/t8e9n4e2t5\/1862154675466279540\/l5f7\/ https:\/\/www.fbi.gov\/investigate\/cyber https:\/\/www.ibm.com\/topics\/cyber-attack https:\/\/www.nibusinessinfo.co.uk\/content\/reasons-behind-cyber-attacks https:\/\/guardian.ng\/technology\/nigeria-lags-behind-mauritius-ghana-others-in-cybersecurity-ranking\/\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/\" \/>\n<meta property=\"og:site_name\" content=\"msmehub2\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-01T18:26:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.msmehub.org\/wp-content\/uploads\/2022\/06\/istockphoto-1222196145-170667a-e1654107888234.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"519\" \/>\n\t<meta property=\"og:image:height\" content=\"332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Busola Akin-Olawore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/versaresearch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Busola Akin-Olawore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/\"},\"author\":{\"name\":\"Busola Akin-Olawore\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/person\\\/70f5b117ce29ff2065a2f5433adde74c\"},\"headline\":\"Cyber-attacks: What, Why &#038; How\",\"datePublished\":\"2022-06-01T18:26:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/\"},\"wordCount\":369,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"cyberattacks\",\"data privacy\",\"data protection\",\"digital assualt\",\"online protection\",\"security infrastructure\",\"security plan\"],\"articleSection\":[\"For Startups\",\"Operations\",\"Start-up Basics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/\",\"url\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/\",\"name\":\"Cyber-attacks: What, Why & How\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2022-06-01T18:26:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/cyber-attacks-what-why-how\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-attacks: What, Why &#038; How\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#website\",\"url\":\"https:\\\/\\\/www.msmehub.org\\\/\",\"name\":\"msmehub2\",\"description\":\"Enabling Nigerian Businesses\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.msmehub.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#organization\",\"name\":\"msmehub2\",\"url\":\"https:\\\/\\\/www.msmehub.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/cropped-msme_logo-1.png\",\"contentUrl\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/cropped-msme_logo-1.png\",\"width\":885,\"height\":249,\"caption\":\"msmehub2\"},\"image\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/person\\\/70f5b117ce29ff2065a2f5433adde74c\",\"name\":\"Busola Akin-Olawore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/06a6bdbe30dcde28ce8df0a4d37e48b97846710a0825272557d530069a33427a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/06a6bdbe30dcde28ce8df0a4d37e48b97846710a0825272557d530069a33427a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/06a6bdbe30dcde28ce8df0a4d37e48b97846710a0825272557d530069a33427a?s=96&d=mm&r=g\",\"caption\":\"Busola Akin-Olawore\"},\"description\":\"Busola is a Data Analyst, Market Researcher and Consumer Behaviour Specialist with over 12 years experience planning, designing and conducting research in Finance, Real Estate, FMCG, Healthcare, Education, Retail, Sustainability and Telecommunication sectors. She holds an Honours Bachelor of Science in Psychology and Health Studies, a Research Analyst Post Graduate Degree and Master\u2019s Degree in Market Research and Consumer Behaviour from IE Business School. Having studied, lived and worked on 3 different continents, she is knowledgeable in 4 languages. Her time is split between running the Market Research company Versa Research and teaching at Orange Academy.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/busolaakinolawore\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/versaresearch\"],\"url\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/author\\\/busola-boyle-komolafe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-attacks: What, Why & How","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/","og_locale":"en_US","og_type":"article","og_title":"Cyber-attacks: What, Why & How","og_description":"In Q4 of 2021, there were an astonishing 1,353 cyber-attacks weekly in Africa, in comparison to an average of 925 cyber-attacks in the world.\u00a0 Cyber-attack is a form of digital assault using computers, networks, or devices with access to the internet; directed towards other computers, networks, or devices with access to the internet which threatens public safety, national security, and economic security. Cybercriminals usually compromise systems and steal financial, property, and\/or intellectual property such as business or customer financial details, sensitive personal identifying information, customer\/employee emails, databases, and so on.\u00a0 As internet penetration is increasing, and more and more people are interconnected through the digital world, there is an increase in cyber-attacks. Examples of typical cyber-attacks are email compromise, identity theft, ransomware, phishing, online predators, and espionage. These attacks damage computer hardware and network, give unauthorized access to data, and in some cases physically harm people.\u00a0 In order to protect your business or yourself, it is important to have a comprehensive security plan and infrastructure that offers protection. Out of 182 countries, Nigeria ranks 47th on the 2020 Global Cybersecurity Index with about 84.76% of measures taken to ensure protection. Mauritius, the highest-ranked in Africa and the 7th ranked in the world, has taken about 96.89% of measures to ensure protection.\u00a0 So what exactly can be done to protect yourself? Use strong passwords that are reviewed and changed at least quarterly\u00a0 Update your software frequently and\/or have automatic updates activated\u00a0 Turn on and use multi-factor authentication Apply firewalls and IPS Have segmented networks Be cautious before you click on links or download attachments\u00a0 Most importantly educate yourself, your family, colleagues about cybersecurity Most cyberattacks come from email compromise, if the email sounds too good to be true, it probably is, therefore do not click nor download, just hit delete.\u00a0 Contact Versa Research your trusted data, research &amp; consulting partner! References https:\/\/techpoint.africa\/newsletter\/techpoint-digest-236\/?utm_source=mailster&amp;utm_medium=email&amp;utm_term&amp;utm_content&amp;utm_campaign=techpoint Africa digest https:\/\/preview.mailerlite.com\/t8e9n4e2t5\/1862154675466279540\/l5f7\/ https:\/\/www.fbi.gov\/investigate\/cyber https:\/\/www.ibm.com\/topics\/cyber-attack https:\/\/www.nibusinessinfo.co.uk\/content\/reasons-behind-cyber-attacks https:\/\/guardian.ng\/technology\/nigeria-lags-behind-mauritius-ghana-others-in-cybersecurity-ranking\/","og_url":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/","og_site_name":"msmehub2","article_published_time":"2022-06-01T18:26:43+00:00","og_image":[{"width":519,"height":332,"url":"https:\/\/www.msmehub.org\/wp-content\/uploads\/2022\/06\/istockphoto-1222196145-170667a-e1654107888234.jpg","type":"image\/jpeg"}],"author":"Busola Akin-Olawore","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/versaresearch","twitter_misc":{"Written by":"Busola Akin-Olawore","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#article","isPartOf":{"@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/"},"author":{"name":"Busola Akin-Olawore","@id":"https:\/\/www.msmehub.org\/#\/schema\/person\/70f5b117ce29ff2065a2f5433adde74c"},"headline":"Cyber-attacks: What, Why &#038; How","datePublished":"2022-06-01T18:26:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/"},"wordCount":369,"commentCount":0,"publisher":{"@id":"https:\/\/www.msmehub.org\/#organization"},"image":{"@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#primaryimage"},"thumbnailUrl":"","keywords":["cyberattacks","data privacy","data protection","digital assualt","online protection","security infrastructure","security plan"],"articleSection":["For Startups","Operations","Start-up Basics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/","url":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/","name":"Cyber-attacks: What, Why & How","isPartOf":{"@id":"https:\/\/www.msmehub.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#primaryimage"},"image":{"@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#primaryimage"},"thumbnailUrl":"","datePublished":"2022-06-01T18:26:43+00:00","breadcrumb":{"@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.msmehub.org\/cyber-attacks-what-why-how\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/msmehub.org\/staging\/6671\/"},{"@type":"ListItem","position":2,"name":"Cyber-attacks: What, Why &#038; How"}]},{"@type":"WebSite","@id":"https:\/\/www.msmehub.org\/#website","url":"https:\/\/www.msmehub.org\/","name":"msmehub2","description":"Enabling Nigerian Businesses","publisher":{"@id":"https:\/\/www.msmehub.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.msmehub.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.msmehub.org\/#organization","name":"msmehub2","url":"https:\/\/www.msmehub.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.msmehub.org\/#\/schema\/logo\/image\/","url":"https:\/\/msmehub.org\/staging\/6671\/wp-content\/uploads\/2025\/06\/cropped-msme_logo-1.png","contentUrl":"https:\/\/msmehub.org\/staging\/6671\/wp-content\/uploads\/2025\/06\/cropped-msme_logo-1.png","width":885,"height":249,"caption":"msmehub2"},"image":{"@id":"https:\/\/www.msmehub.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.msmehub.org\/#\/schema\/person\/70f5b117ce29ff2065a2f5433adde74c","name":"Busola Akin-Olawore","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/06a6bdbe30dcde28ce8df0a4d37e48b97846710a0825272557d530069a33427a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06a6bdbe30dcde28ce8df0a4d37e48b97846710a0825272557d530069a33427a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/06a6bdbe30dcde28ce8df0a4d37e48b97846710a0825272557d530069a33427a?s=96&d=mm&r=g","caption":"Busola Akin-Olawore"},"description":"Busola is a Data Analyst, Market Researcher and Consumer Behaviour Specialist with over 12 years experience planning, designing and conducting research in Finance, Real Estate, FMCG, Healthcare, Education, Retail, Sustainability and Telecommunication sectors. She holds an Honours Bachelor of Science in Psychology and Health Studies, a Research Analyst Post Graduate Degree and Master\u2019s Degree in Market Research and Consumer Behaviour from IE Business School. Having studied, lived and worked on 3 different continents, she is knowledgeable in 4 languages. Her time is split between running the Market Research company Versa Research and teaching at Orange Academy.","sameAs":["https:\/\/www.linkedin.com\/in\/busolaakinolawore\/","https:\/\/x.com\/https:\/\/twitter.com\/versaresearch"],"url":"https:\/\/msmehub.org\/staging\/6671\/author\/busola-boyle-komolafe\/"}]}},"_links":{"self":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts\/42274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/users\/1235"}],"replies":[{"embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/comments?post=42274"}],"version-history":[{"count":3,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts\/42274\/revisions"}],"predecessor-version":[{"id":42297,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts\/42274\/revisions\/42297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/media\/42302"}],"wp:attachment":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/media?parent=42274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/categories?post=42274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/tags?post=42274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}