Jacqueline Hanson-Kotei
The Senior Manager of Enterprise Information, Security, and Governance at MTN, Jacqueline Hanson-Kotei has called on Small and Medium Scale Enterprises (SMEs) to build the requisite capacity and resources to manage cybersecurity issues and challenges.
She made the call at the second MTN Business Executive Breakfast series held in Accra last week.
Jacqueline Hanson-Kotei said, “Most SMEs face cybersecurity issues and challenges because they do not have the requisite tools and resources. Risk assessment of the loopholes and vulnerabilities in a business and an understanding of regulatory requirements regarding your space can serve as a good foundation for mitigating this risk.
It is also important to look at the people you work with i.e., your staff and third parties because their digital practices could pose a risk to your business.”
Organized under the theme, ‘Cybersecurity and Digital Transformation of SMEs,’ the forum presented the opportunity for key industry players and experts to discuss and share knowledge, exchange ideas, push for policy formulation and collaborate on cybersecurity and digital transformation for SMEs.
Ms. Adwoa Asamoah, Audit and Compliance Lead at the Ghana Cyber Security Authority, who delivered the keynote address on behalf of the Director General, commended MTN Ghana for leading the conversation on cybersecurity and digital transformation.
Ms. Asamoah indicated that the government has initiated and established various mechanisms to address Ghana’s cybersecurity challenges. Key interventions are the enactment of the Cybersecurity Act 2020 (Act 1038) CSA, the licensing of cybersecurity service providers, and accreditation of cyber security establishments and professionals in a bid to regulate services by approved standards and procedures.
Panelists who led the discussions at the forum were C.K. Bruce, CEO of Innovare Ghana, Jacqueline Hanson-Kotei, and Audrey Mnisi, Banking Ops, Risk and Cybersecurity Specialist at Ghana Association of Banks.
They recommended some solutions including the call for the enforcement of robust access controls to restrict unauthorized access to sensitive systems and data to reduce potential attack and minimize the impact of a breach.
They also called for the allocation of appropriate resources and all stakeholders should adhere to cyber security policies and practices.