Digital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Facebook X (Twitter) Instagram
Trending
  • NITDA, Wigwe University Align AI Ambitions With National Tech Agenda
  • Nigeria Moves To Deepen Digital Trust As NITDA, Trust Stamp Hold Talks
  • Adebisi Seeks Re-Architecting Insurance Sector To Drive FG’s $1 Trillion Economy
  • Why I Stayed Away From Politics – Leo Stan Ekeh, Zinox Founder
  • Africa Hosts World Health Summit Regional Meeting In Kenya
  • Scaling Skills To Shape Africa’s AI Future
  • NITDA, NYSC Deepen Digital Literacy Partnership
  • Over 54,000 Civil Servants Enrol In DL4ALL Programme As Digital Skills Drive Public Sector Reform
Facebook X (Twitter) Instagram
Digital Times NigeriaDigital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Digital Times Nigeria
Home » These Are The SEVEN STEPS To Take Against Lyceum Attack
Telecoms

These Are The SEVEN STEPS To Take Against Lyceum Attack

Our REPORTERBy Our REPORTER15 November 2021No Comments2 Mins Read1 Views
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
CYBER1
Share
Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp

On Monday, Nigeria’s telecom regulator, the Nigerian Communications Commission (NCC) alerted Nigerians of the existence of another hacking group known as Lyceum orchestrating cyberespionage in the African telecoms space.

Below are the SEVEN steps telecom consumers and the general public can take to prevent any attack by this cybercrime group:

  1. Ensure the consistent use of firewalls (software, hardware and cloud firewalls).
  2. Enable a Web Application Firewall to help detect and prevent attacks coming from web applications by inspecting HTTP traffic.
  3. Install Up-to-date antivirus programmes to help detect and prevent a wide range of malware, trojans, and viruses, which APT hackers will use to exploit your system.
  4. Implement the use of Intrusion Prevention Systems that monitor your network.
  5. Create a secure sandboxing environment that allows you to open and run untrusted programs or codes without risking harm to your operating system.
  6. Ensure the use of the virtual private network (VPN) to prevent an easy opportunity for APT hackers to gain initial access to your company’s network.
  7. Enable spam and malware protection for your email applications, and educate your employees on how to identify potentially malicious emails.

The general public can as well contact ngCERT on incident@cert.gov.ng for further technical assistance.

 

 

READ ALSO  NCC Denies Reports Asking Subscribers To Submit Their Phone IMEI Number
#Cyber-attack #Lyceum Attack #Seven Steps NCC
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNCC Alerts Public Of Another Hacking Group, Lyceum Targeting Telcos, ISPs
Next Article MultiChoice Nigeria Unveils Whitemoney As GOtv Brand Ambassador
Our REPORTER
  • Website

Comments are closed.

Categories
About
About

Digital Times Nigeria (www.digitaltimesng.com) is an online technology publication of Digital Times Media Services.

Facebook X (Twitter) Instagram
Latest Posts

NITDA, Wigwe University Align AI Ambitions With National Tech Agenda

13 February 2026

Nigeria Moves To Deepen Digital Trust As NITDA, Trust Stamp Hold Talks

13 February 2026

Adebisi Seeks Re-Architecting Insurance Sector To Drive FG’s $1 Trillion Economy

13 February 2026
Popular Posts

Building Explainable AI (XAI) Dashboards For Non-Technical Stakeholders

2 May 2022

Building Ethical AI Starts With People: How Gabriel Ayodele Is Engineering Trust Through Mentorship

8 January 2024

Gabriel Tosin Ayodele: Leading AI-Powered Innovation In Web3

8 November 2022
© 2026 Digital Times NG.
  • Advert Rate
  • Terms of Use
  • Advertisement
  • Private Policy
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.