Cybersecurity Protocols and Threat Mitigation Strategies of Select Media Organisations in Abuja, Nigeria

Authors

  • Sharifatu Gago Ja’afaru Department of Mass Communication Glorious Vision University, Ogwa, Edo State, Nigeria (Formerly Samuel Adegboyega University) Ogwa, Edo State, Nigeria https://orcid.org/0009-0000-8721-1457
  • Kelvin Inobemhe Department of Mass Communication Glorious Vision University, Ogwa, Edo State, Nigeria (Formerly Samuel Adegboyega University) Ogwa, Edo State, Nigeria https://orcid.org/0009-0000-8721-1457

DOI:

https://doi.org/10.5281/zenodo.14034385

Keywords:

Cybercrime, Cybersecurity, Cyberspace, Media, Mitigation Strategy

Abstract

The researchers investigated cybersecurity protocols and threat mitigation strategies in selected media organizations in Abuja. They employed in-depth interviews to collect relevant qualitative data for the study. Grounded in protection motivation theory, the researchers analyzed how these media organizations respond to cybersecurity threats. Findings revealed that media organizations have a societal obligation to gather and disseminate information, allowing citizens to make informed decisions and avoid danger. Further findings showed that media organizations in Nigeria face cybersecurity threats, including ransomware, credential theft, and phishing attacks. It was also found that the cybersecurity measures implemented by the selected media organizations are, to a considerable extent, highly effective. The study concluded that identifiable cybersecurity threats exist for media organizations in Nigeria. Therefore, it is essential for media organizations to continuously educate their staff on the latest cybersecurity trends to protect the confidentiality, integrity, and availability of information shared online.

Downloads

Published

2024-11-04

How to Cite

Sharifatu Gago Ja’afaru, & Kelvin Inobemhe. (2024). Cybersecurity Protocols and Threat Mitigation Strategies of Select Media Organisations in Abuja, Nigeria. GVU Journal of Research and Development, 1(2), 111–126. https://doi.org/10.5281/zenodo.14034385

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.