Connect with us

Technology

Navigating the Digital Age: Why Cybersecurity is Everyone’s Responsibility

Published

on

Navigating the Digital Age: Why Cybersecurity is Everyone’s Responsibility
By Abuh Ibrahim Sani

 Introduction

As technology continues to evolve, the significance of cybersecurity cannot be underestimated. Cyber threats continue to increase daily, with hackers developing sophisticated tools to carry out heinous acts; individuals and corporate bodies must arm themselves with the basic knowledge and tools to navigate the digital landscape safely.

The challenge of Internet security has grown significantly. Nearly everything we use, see, or come into contact with is online, including wearable technology, home appliances, cell phones, and even partially driverless cars. Businesses, governments, and other institutions may access trade secrets, medical information, and financial data remotely thanks to the Internet. This is the paradox of connectivity; the more interconnected our computer systems are, the more vulnerable they are to data theft, malware, operational disruption, and even outright physical harm to network and hardware infrastructure.

Despite the efforts of industries, corporate bodies and government to protect cyberspace, there is a greater threat which stands as the worst part of threats – the human factor and psychology. No matter the number of security devices like firewalls, intrusion detections, and intrusion prevention tools put in place by organizations can guarantee sufficient security without addressing the human element and its impact on security. The failure to consider human psychological means there is no security. There is a need for education, training, and awareness that cybersecurity is everyone’s business not the sole responsibility of IT professionals or cyber experts. It is a collective effort to protect cyberspace, data and network infrastructure. There is so much ignorance on the issue regarding cybersecurity that needs to be addressed. The absence of basic cybersecurity knowledge makes small and medium enterprises vulnerable to attacks, allowing attackers to steal from people and their assets. There should be a rigorous campaign in public gatherings such as schools, parks, etc. An effective cyberattack against one person frequently leads to a cyberattack against an organisation. Additionally, if they are not trained to recognise the telltale signs of a cyberattack, they may unintentionally allow an attacker in by the front door or rear door.

Cybersecurity is a crucial issue in the digital age, yet its complexities can be intimidating for everyday users. This paper aims to bridge that gap by offering a clear and practical approach to cybersecurity education.

One of the main concerns in safeguarding a country’s cyber sovereignty from hostile activity is through education and awareness. This demonstrates how crucial cybersecurity education is to foster the development of a robust cybersecurity ecosystem promote cyber sovereignty create safe digital and IT infrastructure and services, protect against advanced cyberattacks, and raise people’s knowledge and maturity in cybersecurity.

Global authorities and people alike are increasingly concerned about cybersecurity resilience, especially as people’s awareness of their privacy is growing. Therefore, we assume that educating people about cybersecurity is essential to building a society and businesses that are resilient and secure online.

 

Understanding Cybersecurity Basic

 In a modern world dominated by technology, the term “Cybersecurity” has become important in ensuring the integrity, confidentiality and availability of digital information. Cybersecurity can be described as the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. It involves developing mechanisms and strategies to defend against a diverse array of cyber threats.  In the field of cybersecurity, the biggest threat often lies not in technology, but in the human element. Despite improvements in digital security measures, social engineering attacks continue to exploit the most vulnerable part of any security system; the people who use it. These attacks underscore a significant challenge, as they involve persuading individuals to give out sensitive information or take actions that put security at risk. Cybercriminals are using more and more advanced methods, such as psychological manipulation, to get around technical defences. This study seeks to shed light on the strategies employed in social engineering attacks and highlight the significant impact of human elements in cybersecurity. By identifying and resolving these weaknesses, we can enhance the security of sensitive data and improve overall safety measures. Emphasizing human factors is not just a component of cybersecurity, but it is the key to a strong security plan.

 

Why Cybersecurity Matters, Even for everyday users?

Cybersecurity might seem like a concern reserved for IT professionals, but that’s not the case. In our increasingly connected world, where our personal and professional lives rely heavily on digital tools, cybersecurity is crucial for everyone.

We entrust a vast amount of sensitive information to online platforms, from financial records ,medical record to personal details. Unfortunately, some of these platforms don’t always have adequate security measures in place. This leaves our information vulnerable to theft and misuse. Every online interaction contributes to building our digital identity. Cybersecurity helps safeguard our privacy by protecting our accounts from unauthorized access and threats. It prevents identity theft and ensures the confidentiality of our information .

In July 2016, The DNC email leak is a prime illustration of how social engineering can result in a significant security breach. Hackers were able to access the DNC’s email system by carrying out a phishing attack. A legitimate Google security team sent an email to DNC staff members, asking them to reset their passwords. When staff clicked the link and entered their login information, they unknowingly gave hackers access to their email accounts. This incident revealed important political communications and caused significant consequences. Social engineering and the significance of securing account recovery protocols, staff training and awareness.

 

Economic Implications of Cyber Theft

Individuals, businesses and industries are prime targets of cyber threats. For startups and multinational companies, the consequences of cyber-attacks and theft can be devasting and significant, leading to financial losses, reputational damage, and even bankruptcy in some terrible cases.

In 2021, Facebook suffered a data breach that leaked users’ information.  The breach emerged that a total of 533 million users’ personal information was compromised. The attack cost Facebook a total cost of $3.7 billion. And also, In 2017, Equifax suffered a data breach due to poor cybersecurity handling and management. The breach resulted in approximately 143 million American customers losing their personal information such as social security number, date of birth, driver’s license, addresses and other sensitive information. The company pays compensation to the tune of $ 1.3 billion as a consequence of the data breach. These losses are due to poor measures or negligence by the company which affected individuals. These examples highlight the impact of human error in cyber-attack.

A lack of knowledge and awareness of the importance of cybersecurity has led to many losses. There is an urgent need for an aggressive campaign to educate the masses on how cyber theft can harm their lives and businesses. Business loss and data theft are on the increase daily due to ineffective policy, protection and awareness among the people, resulting in economic loss.

 

A shared Responsibility

 Contrary to the perception and belief of the populace that cybersecurity is a thing of IT professionals, in a real sense, cybersecurity is everyone’s responsibility. Responsibilities that require the active participation of every individual who interacts in the digital world and outside the platform. Anyone can be a victim of cybercriminals, either online or offline. Every person has a role to play to have a safe cyberspace . These roles range from using a strong password for an online application or platform to knowing who you share information with and what information you share with people. Individuals and corporate bodies are responsible for securing credit cards, debit cards, and other sensitive information. Being vigilant would protect everyone and loved ones from social engineering, phishing and other forms of hackers’ tricks of obtaining information. Phishers do not use advanced technologies; instead, they take advantage of human nature to commit hacking. There is a dearth of knowledge on which ring in the information security chain is first compromised, even though people are more to blame for the chain’s fragility than technology. Research has shown that certain personality traits increase a person’s susceptibility to different types of lures.

To back up the point why cybersecurity is a shared responsibility. In 2021, a Colonial Pipeline Ransome attack resulted in a shortage of fuel across the southeastern United States. The attacker exploited a compromised password to gain access to the company network. This breach demonstrated how a weak password can lead to widespread disruptions. Also in 2020, a Zoom security incident occurred during covid-19 pandemic when a user failed to secure the meeting with a password or used public links which allowed uninvited participants to disrupt the meetings. Individuals need to comprehend and make use of security options offered by platforms, like implementing passwords for meetings and utilizing waiting areas . This scenario shows that cybersecurity is more than just technical solutions; it also involves user behaviour and awareness. Security cannot be achieved by simply installing a robust security system. Ignoring the human factor and failing to raise awareness will lead to security breaches.

 

Social Engineering (Exploiting Human Psychology)

Social Engineering is an act of obtaining sensitive information from victims through pretence. An attacker could come as a legitimate person and obtain information without the victims verifying their identity before releasing information. Social Engineering is increasing, according to statistics due to technological advancement and attractiveness in the world. Many have fallen for social engineering attacks, and many will still be victims. There is a need for a holistic approach by government and policymakers to develop strategies on how to educate and create awareness for the masses to be aware of whom they share information with and what to share. A zero-base trust mindset should be encouraged. An organization needs to do more to train employees, both recruits and old staff, to be aware of hackers’ tricks. Hackers can pretend to be staff members of a company and come in the way of helping an employee in distress, but in a real sense, it’s an act to obtain valuable information from the staff. Hackers’ tricks involve playing with human thinking and behaviours, the act of deceiving and convincing to get sensitive information about individuals or organizations.

Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Unlike other cyber threats that depend on the use of software and online platforms and loopholes in the system, social engineering targets human elements, exploiting their weaknesses and the natural tendency to trust. This can be done offline without the use of any software. It is just a matter of technique and tactics. It is called “Master the Art”.

In July 2020, Twitter experienced a significant breach in which numerous prominent accounts were taken over to endorse a Bitcoin scam. The attackers employed phone spear phishing to deceive Twitter employees into giving access to internal tools. They pretended to be IT department staff and persuaded employees to disclose their credentials during phone calls. Upon gaining entry, the intruders seized verified accounts of significant individuals and businesses, sharing messages requesting Bitcoin from followers with a pledge to double their investment. This event demonstrates how social engineering can be used to target insiders to access important systems.  Social engineering attacks can be carried out in different format such phishing, shoulder surfing, malware, phone, social media chat, ransomware, malware, eavesdropping. These are easy because of human error and behaviour toward their information security.

Information security is everyone’s business, it’s your primary responsibility to protect your data from being compromised and stolen. Hackers are aware that human beings are the easier target so they leverage the emotional state, negligence, carelessness, and ignorance to steal information. Many are victims of social engineering and many will still fall because people tend to forget the basic principles of security. It’s human nature, however, all hope is not lost if you take precautionary measures to protect yourself and your organization. Companies with sophisticated security appliances have been hacked due to human error.  Protect your password like your life, no one should have access to your password even if the person is the IT of your company. Remember, the protection of your information is your responsibility. No security measure can prevent your data from being stolen if you give free access to the attacker.  In simple interpretation, if you leave your door open without locking it, you will know what the outcome would be.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Zero Trust Architecture in a Remote World: Securing the New Normal

Published

on

Zero Trust Architecture in a Remote World: Securing the New Normal

By Abuh Ibrahim Sani

The ongoing shift to remote work, prompted by the global Covid-19 pandemic, has permanently changed the way organizations and certain government agencies function. What began as a temporary fix for maintaining consistency has transformed into a permanent approach to business for numerous companies. However, the change brings about considerable security obstacles. Traditional network security models, which rely on perimeter-based defenses, are not adequate for a modern environment where employees work remotely from multiple devices. This is how the Zero Trust Architecture (ZTA) is utilized in the new era of cybersecurity.

Introducing the Zero Trust Architecture, a strategic shift in cybersecurity that is built on the belief that no entity in the network, regardless of location, should be automatically trusted. This model is especially relevant in situations of remote work where the lines between the company’s network are not clear, making it a great structure for applying Zero Trust. Zero Trust’s fundamental principles of strict verification and limited access privileges create a strong base for protecting remote employees and data from the challenges of cyber threats.

Understanding Zero Trust: “Never Trust, Always Verify”

The foundation of the Zero Trust model is based on a fundamental principle. Do not automatically trust anyone; consider everyone a potential suspect until they can be verified beyond a reasonable doubt, regardless of their location within or outside the network. Zero Trust differs from traditional security models by assuming that potential threats can originate from any source, not just from within the corporate network where users are presumed trustworthy. Each access request is confirmed, approved, and consistently supervised according to user identity, device security state, and request context. Zero trust is not a specific product or technology, but rather a holistic strategy that combines different security principles and tools to verify access strictly and reduce threats by segmenting resources and implementing least-privilege access.

Why Remote Work Demands Zero Trust

The traditional network perimeter has disappeared with remote work. Employees now access company data from their home networks, coffee shops, or shared spaces, often using their own devices. This new version brings about various difficulties in home and public Wifi networks oftens lack enterprise-level security, making remote workers more vulnerable to attacks like man-in-the middle or eavesdropping . The rise of software-as-service(SaaS) and cloud based application has enabled remote work flexibility but complicates oversight. Sensitive corporate data may be accessed and stored outside the traditional network, increasing the attack surface. Employees are no longer restricted to corporate devices. Many use personal devices or BYOD(Bring Your Own Device), which may not have the same security configuration as enterprise-managed systems.

In a remote environment, organization cannot longer rely on internal trust, especially when collaboration spans across teams, contractors, and third-party vendors. Remote workers face a higher likelihood of being preyed upon by phishing attempts and social engineering tactics. In the absence of IT teams physically present and the increased stress of working alone, employees may be more susceptible to sophisticated attacks aimed at stealing credentials and breaching corporate systems. In this landscape, Zero Trust becomes important for securing remote work environments.

Implementing  Zero Trust Architecture in a Remote Workforce

Shifting to a Zero Trust model in a remote setting requires a strategic plan that emphasizes thorough identity and device validation, secure access control, education, and continuous monitoring. These measures involve various steps to strengthen the remote work infrastructure against possible cybersecurity risks. The following measures should be considered when adopting remote work environments.

  • Identity and Access Management (IAM)

Identity is the foundation of the Zero Trust approach. Each individual, whether they are a staff member, freelancer, or external supplier, needs to have their identity confirmed. Multi-Factor Authentication (MFA) and biometric verification provides an additional level of security on top of traditional username and password authentication. Furthermore, features such as Single Sign-On (SSO) and Role-Based Access Control (RBAC) guarantee that users only have the necessary level of access required for their tasks.

  • Principle of Least Privilege (Access Control)

In Zero Trust environments, policies are both dynamic and contextually sensitive. Access is provided by considering contextual factors such as user location, device status, time of access, and the sensitivity of the requested data, instead of giving blanket permissions. This method, commonly referred to as adaptive authentication, guarantees that access restrictions change according to up-to-date information.

  • Endpoint Security

Ensuring device security is of utmost importance as employees use a variety of devices to access corporate data. Before permitting access, organizations must assess the security status of every device as part of implementing Zero Trust. This involves implementing patch management, malware detection, and configuration policies on all devices. Endpoint Detection and Response (EDR) tools continuously monitor device behavior, detect anomalies, and promptly respond to threats.

  • Micro-Segmentation

Zero Trust Architecture focuses on limiting access to only those resources necessary for a user’s job. Through micro-segmentation, networks are divided into smaller, isolated zones, each with its own security policies. Even if a cybercriminal gains access to one segment, they won’t have unrestricted access to other areas of the network. This significantly reduces the blast radius in case of an attack.

  • Continuous Monitoring and Analytics

Verification is not a singular event in a Zero Trust framework. Constant monitoring of network traffic, endpoints, and user behaviours is essential for organizations to detect potential threats. SIEM and UEBA systems are capable of identifying irregularities like unusual login locations, unexpected data transfers, or unusual activity patterns, which could suggest malicious behaviour.

  • Data Encryption and Protection

Encryption is essential in Zero Trust due to the transmission of data through insecure networks and endpoints. Data needs to be encrypted while in motion and while at rest, guaranteeing that hackers are unable to steal sensitive information even if they intercept data transmission or breach devices. DLP tools at endpoints can aid in enforcing policies to stop unauthorized sharing of vital information.

  • Securing all resources

In a Zero Trust setting, all assets are safeguarded equally, whether they are in the cloud, on-site, or spread across diverse hybrid systems. This includes securing cloud apps and data with the same level of protection as on-site resources, defending older systems lacking contemporary security measures, and ensuring that all devices, workloads, APIs, and communication channels undergo consistent security evaluation, establishing a cohesive and safe environment.

  • Educate and Train the Employees

A knowledgeable and alert staff is essential for Zero Trust security. It is crucial to have regular security training sessions on phishing awareness, security best practices, and the importance of security in remote work environments. Implementing the Zero Trust model during remote work allows organizations to establish a secure setting that can effectively address the unique challenges of working remotely. This thorough method guarantees that the integrity and security of the organization’s data and resources are upheld no matter where employees are working, in line with the zero Trust principles of not inherently trusting any entity in or out of the network.

Benefits of Zero Trust for Remote Work

Traditional security models are no longer sufficient due to the rapid evolution of cyber threats and the growing complexity of modern work environments. Securing corporate assets requires a new approach as businesses shift to cloud-based services, facilitate remote work, and incorporate various devices into their networks. This is when the adoption of a Zero Trust approach becomes essential.

Zero Trust mitigates the risk of data breaches by continuously verifying every access attempt and reducing the exposure of critical resources. Zero Trust allows for a secure and smooth remote work experience by separating security from a specific location or device. Workers have the flexibility to work remotely, as long as the company upholds strict security measures. As Zero Trust does not depend on trust within the internal network, it reduces the danger of disgruntled employees or compromised accounts.

Many industries are subject to strict data privacy and security regulations. Zero Trust aids compliance by ensuring that data access is limited, monitored, and secure. As companies increasingly use cloud services, remote employees, and dispersed teams, Zero Trust ensures security grows in line with advancements. It is a method designed to be flexible, allowing organizations to adjust to emerging threats and technologies.

 Implementation Challenges And Considerations

Even though the advantages of Zero Trust are evident, the implementation of this structure necessitates meticulous planning and financial resources. Zero Trust signifies a major shift from conventional security methods. Organizations need to make sure that employees, especially those working in IT, are knowledgeable about the new approach. Building a Zero Trust Architecture requires a substantial investment in technology, training, and process transformation due to its cost and complexity. Yet, the advantages in the long run are usually more significant than these expenses. Many businesses depend on older systems that may not smoothly integrate with a Zero Trust model. It is advised to begin with the most essential systems when gradually implementing changes.

 Conclusion

With remote work becoming increasingly common, organizations require a security model that can adjust to the unique challenges presented in this new setting. The Zero Trust Architecture offers the structure to protect a geographically dispersed workforce by verifying all access requests, monitoring every device, and safeguarding every resource. In a changing world of evolving threats and remote work, Zero Trust is not just an option—it is crucial.

Implementing zero trust in remote work settings includes utilizing multifactor authentication, biometric verification  using secure, encrypted connections like VPNs, and consistently monitoring and assessing user and device actions for possible risks. Adopting Zero Trust principles aligns with remote work security needs and provides a thorough structure for organizations aiming to effectively secure their remote employees. By following Zero Trust principles, businesses can establish a security stance that is flexible, robust, and equipped to tackle the specific obstacles brought on by remote work. Focusing on Zero Trust is a pre-emptive measure to guarantee that the security measures adapt as the workplace changes.

Continue Reading

Technology

Enhancing Data Literacy for Better Decision-Making in Nigeria through NITDA’s DL4ALL Initiative

Published

on

Enhancing Data Literacy for Better Decision-Making in Nigeria through NITDA’s DL4ALL Initiative

Enhancing Data Literacy for Better Decision-Making in Nigeria through NITDA’s DL4ALL Initiative

“In God we trust. All others must bring data.” — W. Edwards Deming

By Ernest Ogezi

In the digital era, data has become the new currency, driving decisions in every sector from business to healthcare, education, and governance. In Nigeria, the importance of data literacy—the ability to understand, interpret, and effectively use data—has never been more apparent. As the country seeks to establish itself in the global digital economy, the need for enhanced data literacy among its citizens, businesses, and institutions is critical for informed decision-making and sustainable development.

In an increasingly data-driven world, the ability to navigate, interpret, and draw meaningful insights from data is a vital skill. For Nigeria, a country with a rapidly growing population and economy, data literacy is a powerful tool for addressing complex challenges, from economic development and public health to education and social welfare. With the rise of big data, artificial intelligence, and the Internet of Things (IoT), individuals and organizations are continuously generating and interacting with vast amounts of information.

Data literacy empowers individuals to make informed decisions, whether they are students, entrepreneurs, or policymakers. For businesses, especially in Nigeria’s dynamic informal sector, understanding data can lead to better market strategies, efficient resource management, and increased competitiveness. For government agencies and NGOs, data literacy is essential for designing effective policies, allocating resources wisely, and measuring the impact of programs. In education, it helps students and educators engage with information critically, fostering a generation of problem-solvers who can drive innovation and growth.

Aware of the importance of data literacy, the National Information Technology Development Agency (NITDA) has taken significant steps to enhance the digital capabilities of Nigerians. Through initiatives like the “Digital Literacy for All” (DL4ALL) program, NITDA aims to equip citizens with essential digital skills, including data literacy. The DL4ALL initiative, launched in partnership with the National Youth Service Corps (NYSC), focuses on empowering individuals to browse, search, filter, and evaluate digital content effectively.

Data literacy is a key component of NITDA’s broader Strategic Roadmap and Action Plan (SRAP 2.0), which emphasizes building a digitally savvy population capable of participating actively in the global digital economy. The agency recognizes that to harness the full potential of data, individuals must not only access it but also interpret and use it meaningfully. By integrating data literacy into its digital literacy programs, NITDA is fostering a culture where data becomes a crucial part of decision-making processes across all sectors.

Nigeria’s informal sector, which employs a significant portion of the population, stands to benefit immensely from enhanced data literacy. Market traders, small business owners, artisans, and entrepreneurs can use data to better understand customer preferences, manage inventory, optimize pricing strategies, and forecast market trends. For example, by analyzing sales data, a market vendor can identify the best-selling products, peak shopping hours, and customer demographics, enabling them to tailor their offerings and maximize profits.

Data literacy is also essential for effective governance and policy-making. In Nigeria, where resource allocation, public health, education, and infrastructure development are critical issues, data-driven decision-making can lead to more targeted and impactful interventions. By analyzing data on population demographics, economic activities, health trends, and educational outcomes, policymakers can identify gaps, monitor progress, and adjust strategies to address the needs of different communities more effectively.

NITDA’s efforts to promote data literacy through initiatives like DL4ALL are steps in the right direction, laying the foundation for a digitally literate society. As Nigeria continues its journey towards becoming a leader in the digital economy, building a culture of data literacy will be crucial for navigating the complexities of the modern world and ensuring sustainable development for all.

Continue Reading

Technology

Bridging the Digital Divide: NITDA’s DL4ALL Initiative Empowering Nigeria’s Informal Sector through Digital Literacy

Published

on

Enhancing Data Literacy for Better Decision-Making in Nigeria through NITDA’s DL4ALL Initiative

Bridging the Digital Divide: NITDA’s DL4ALL Initiative Empowering Nigeria’s Informal Sector through Digital Literacy

“The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn.” — Alvin Toffler, American writer and futurist.

By Ernest Ogezi

In today’s digital age, where technology drives much of the global economy, digital literacy has emerged as a powerful tool for economic growth and inclusion. In Nigeria, where millions still face economic disparities, digital literacy offers an opportunity to transform the livelihoods of those in the informal sector. The National Information Technology Development Agency (NITDA) is leading this effort through its “Digital Literacy for All” (DL4ALL) initiative, aimed at equipping Nigerians with essential digital skills. This initiative, particularly focused on underserved communities, holds immense potential to narrow the digital divide and empower informal workers across the country.

NITDA’s DL4ALL program, launched in partnership with the National Youth Service Corps (NYSC), represents a significant step forward in expanding digital literacy nationwide. Youth corps members are being mobilized as digital literacy ambassadors, tasked with training millions of Nigerians in their local communities. Launched across 12 states, including the Federal Capital Territory (FCT), Kebbi, Jigawa, and Kwara, among others, the initiative aims to boost Nigeria’s digital literacy rate to 70% by 2027.

Highlighting the importance of youth involvement, NITDA Director-General, Kashifu Inuwa Abdullahi, CCIE emphasized the pivotal role that NYSC members will play in this endeavor. Positioned within local communities, these young graduates will serve as key players in promoting digital literacy, especially in remote and underserved areas.

The informal sector is a critical component of Nigeria’s economy, accounting for around 65% of employment and contributing significantly to the country’s Gross Domestic Product (GDP). However, many informal workers—such as market traders, artisans, and small business owners—continue to rely on outdated methods and are largely disconnected from the benefits of the digital economy. For these individuals, basic digital literacy could be transformative, opening up new avenues for growth and income generation.

This is where the DL4ALL initiative becomes particularly relevant. The program focuses on equipping informal workers with fundamental digital skills, such as using the internet, navigating mobile applications, and managing data. These skills are essential for improving productivity, accessing broader markets, and expanding networks. According to NITDA’s DL4ALL platform, digital literacy encompasses abilities like searching for and evaluating online information, managing digital content, and understanding how to protect personal data​. For workers in Nigeria’s informal sector, acquiring these skills could mean accessing new opportunities, improving business efficiency, and fostering economic resilience.

DL4ALL is a part of NITDA’s larger Strategic Roadmap and Action Plan (SRAP 2.0), which is designed to position Nigeria as a competitive player in the global digital economy. The initiative is also aimed at improving access to essential services, enhancing employability, and increasing citizen participation in the digital economy, with a special focus on empowering young Nigerians.

Nigeria’s ambition to achieve 95% digital literacy by 2030 is bold but necessary. One of the unique strengths of the DL4ALL initiative lies in its decentralised approach, which leverages the NYSC’s reach and the trust that corps members often command in their assigned communities. This grassroots model is especially effective in rural and marginalized areas, where access to formal education and training can be limited.

Continue Reading

You May Like

Copyright © 2024 Acces News Magazine All Right Reserved.

Verified by MonsterInsights