The growing cyber threat landscape in West Africa

West Africa’s digital economy is experiencing rapid growth, with over 120 million active internet users and a mobile-first approach to technology adoption.

However, this expansion has also led to increased exposure to cyber threats. According to the Africa Cybersecurity Report (2023), Ghana, Nigeria, and Côte d’Ivoire collectively recorded approximately $710 million in cyber-related financial losses over two years.

These threats encompass phishing, mobile money fraud, cross-border malware, ransomware, and supply chain attacks on cloud infrastructure.

A critical solution gaining attention is Cyber Threat Intelligence (CTI) and cross-border information sharing. Yet, adoption remains inconsistent and often under-resourced.

Shared Threat

In discussing the greatest digital threats facing the sub-region, Mr. Eric Akwei, a seasoned Ghanaian IT professional, cybersecurity advocate, and published author, emphasized the cross-border nature of cybercrime.

“Our biggest challenge is fragmentation,” he stated. “Attackers move swiftly across jurisdictions, but our systems do not. A phishing campaign originating in Lagos can impact businesses in Accra within hours, yet our threat response systems are largely confined within national borders.”

He highlighted that countries like Ghana and Nigeria share interconnected digital ecosystems, including banks, telecoms, and government platforms. This interconnectedness makes shared threat intelligence not just beneficial but essential.

Slow Response Times

Addressing the state of incident response in Ghana and neighboring countries, Mr. Akwei cited regional cybersecurity reviews indicating that many institutions take over 72 hours to detect serious breaches, with full containment taking anywhere from 10 to 20 days.

“These aren’t just statistics, they represent significant financial losses, reputational damage, and operational disruptions,” he explained. “Faster detection enables faster action, which is only possible through participation in a broader, real-time intelligence network.”

He suggested that a shared CTI system, even if initially piloted among a few ECOWAS nations, could significantly reduce detection times.

Regional Threat Intelligence Exchange Framework

When asked about the form such intelligence sharing could take, Mr. Akwei proposed a West African Threat Intelligence Exchange Framework. This would involve creating a secure, regionally managed platform, possibly under ECOWAS, that enables certified institutions to share anonymized threat data promptly.

“It doesn’t have to be high-tech from the start,” he clarified. “It could begin with email-based reports or an encrypted portal for verified CERTs and SOC teams to post and retrieve threat indicators. The key is establishing trust and infrastructure first.”

He stressed the importance of regional trust frameworks that respect national laws while allowing operational flexibility.

Threat Analysts

No CTI system can function effectively without trained personnel. Mr. Akwei noted that despite the growing number of cybersecurity graduates in Ghana and Nigeria, fewer than 15% are trained in handling or analyzing real-world threat intelligence feeds.

“To be effective, a CTI analyst needs to interpret log data, spot anomalies, connect threat patterns, and communicate alerts in actionable language,” he explained. “We need not just technicians but threat interpreters.”

He proposed establishing a West African CTI Training Lab, hosted by a university or regional body, offering short courses, certifications, and simulations.

Public-Private Collaboration Is Critical

While governments often lead national cybersecurity strategies, Mr. Akwei emphasized that most data, traffic, and endpoints are managed by private organizations. He believes these organizations must be integrated into any regional CTI effort from the outset. “Telecoms, banks, fintech startups, they face threats constantly. If they’re not contributing to and benefiting from the CTI system, we’re missing a significant portion of the threat landscape,” he stated.

He proposed that regional CTI initiatives include a tiered participation model, allowing not just national CERTs but vetted industry stakeholders to contribute and benefit.

Let’s Not Just React. Let’s Predict

Moving into more advanced territory, Mr. Akwei emphasized that CTI shouldn’t be solely reactive. “Currently, we treat CTI like a fire alarm. But with AI and big data, it can be a fire forecast.”

He proposed a research program to explore predictive threat intelligence in the West African context. This could involve aggregating anonymized logs, analyzing trends over time, and using machine learning to forecast likely attack windows or methods.

He supports this with his academic contribution through a peer-reviewed paper titled “AI-Driven Infrastructure Protection Framework for Resilient Enterprise Networks”, as well as his public-facing article “Cloud Security is Critical in Preventing Data Breaches – Cybersecurity Expert”. These works emphasize proactive defense strategies and the role of AI in transforming security infrastructure.

A Vision for Collaborative Defense

As the interview concluded, Mr. Akwei emphasized that none of his suggestions require reinventing the wheel. “These systems exist globally. The EU has them. ASEAN has them. Africa, especially West Africa, needs them now.”

He stressed that the time for reactive, isolated cybersecurity is over, and that the real value of threat intelligence lies in how widely and quickly it can be shared. “Our networks are connected. Our threats are shared. It’s time our defenses were, too.”

In addition to Mr. Akwei, other experts have significantly advanced cybersecurity resilience in the region. Dr. Albert Antwi-Boasiako, the founding Director-General of Ghana’s Cyber Security Authority, has led the country’s national strategy and regulatory implementation. Prof. Kester Quist-Aphetsi has introduced AI-based methodologies to national security infrastructure through his role at the National Cyber Intelligence and Defense Research Project.

Prof. Winfred Yaokumah has elevated cybersecurity education standards at the University of Ghana. Dr. Benjamin Yankson, based at SUNY Albany, connects Ghanaian researchers and students with global best practices through his frequent workshops and collaborative projects.

Dr. Jamal Tonzua helps align Ghana’s cyber laws with international standards. Frank Mensah contributes to security innovation in healthcare and fintech using AI, while Prof. Nii Narku Quaynor, a pioneer of Africa’s internet infrastructure, laid the groundwork for secure, scalable networks in the region.

Together, these thought leaders are building a foundation for regional cooperation, knowledge sharing, and proactive cybersecurity, ensuring West Africa is prepared not just to respond to cyber threats, but to anticipate and outmaneuver them.
 
Writers:
Eric Akwei (IT & Cybersecurity Professional)
Stephen H. Polley (IT/BSS Operations Lead – Telecel Ghana)
Simeon Asenso (IN/BSS Solutions Architect – Ericsson)

Share Us
0Shares

Leave a Reply

Your email address will not be published. Required fields are marked *