Wumi AJAYI, Obi Ibeto, Taiwo Olomola and Mathias Madewa


Modern means of communication have improved the way of life of humans around the world. Never has there been a time of unprecedented innovation in the way we humans communicate and share information with one another. Modern Technology has made it conceivable to keep in contact with our family, companions, and colleagues. Modern applications like Zoom, Google Hangout and Microsoft Teams have seen a geometric increase in new users and this growth has reflected the company’s share price. However, the use of modern technology has brought with it issues and concerns in terms of cyberthreats. This study helps to identify modern cybersecurity threats and how to effectively mitigate against them.

The methodology used for this study was based on literature search and analysis, we also used model adaptation from generic ones.

Our finding show that Organizations now need to grapple with these unprecedented threats and find effective solutions to protect their data, applications, and people from the risk of cyber-attacks and at the same time ensure they adhere strictly to regulatory requirements. This paper sheds light on the modern cyber security threat and identifies methods of mitigating against these threats. This paper can also be used as a Cyber security survival guide to investigate information and protect against cybersecurity threats in an organization.

In conclusion, the aim of this paper review is to explore the more recent Cybersecurity threats and recommend effective method that can be adopted at an organizational level to guards against these persistent threats.


Cybersecurity, Threats, Cyber Attacks, Risk Management, Privacy, Corporate Organizations

Full Text:



Khan, Navid Ali; Brohi, Sarfraz Nawaz; Zaman, Noor (2020): “Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic”. TechRxiv. Preprint. pp 3.

Arun P.C Sukumar, Zimu Xu, Krishna Satyanarayana, Richard Tomlins (2019) “An exploration of cyber-security risk management in small businesses: The case UK Micro and Small firms” ISBE 2019 Conference Proceedings, Institute for Small Business and Entrepreneurship, ISBN 978 -1-900862-32-5. pp 1.

Berry, C.T. and Berry, R.L. (2018) ‘An initial assessment of small business risk management approaches for cyber security threats’, International Journal of Business Continuity and Risk Management,Vol. 8, No. 1, pp.1–10.

William Stalling (2019), “Effective Cybersecurity: A Guide to Using Best Practices and Standards”. Pearson Education Inc. Library of Congress Control Number: 2018941168. pp 39-666.

Pekkola, S. and Päivärinta, T., (2018), Introduction to the Minitrack on Information Systems Success and Benefits Realization. Proceedings of the 50th Hawaii International Conference on System Sciences. pp 1.

Eling, M. and Schnell, W., (2016). What do we know about cyber risk and cyber risk insurance? The Journal of Risk Finance, 17(5), pp.474-491

Finnerty, K., Motha, H., Shah, J., White, Y., Button, M. and Wang, V., (2018), Cyber Security Breaches Survey 2018, Department for Digital, Culture, Media and Sports, Cyber Security Breaches Survey 2018: Statistical Release, pp 1.

J. W. Han, O. J. Hoe, J. S. Wing, and S. N. Brohi, “A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware,” in Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence, 2017, pp. 222–226

Rabia Tahir, (2018)A study of Malware and Malware Detection Techniques. Department of Computer science, virtual university of Pakistan. I.J. Education and Management Engineering, 2018, 2, 20-30. pp. 2-11.

Jeff May, Christopher Ahlberg (2020) The Security Intelligence Handbook Third Edition – How to Disrupt adversaries and reduce risk with security intelligence. Permission Department, CyberEdge Group, 1997 Annapolis Exchange Parkway, Suite 300, Annapolis, MD, 21401, ISBN 978-1-948939-16-4 (eBook). pp 10 - 155

Paulsen, C. , Witte, G. and Feldman, L. (2017), Fundamentals of Small Business Information Security, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], (Accessed March 21, 2022). pp 1-4.

Levi Gundert (2020) The Risk Business, What CISO Need to Know about Risk-Based Cybersecurity. Permission Department, CyberEdge Group, 1997 Annapolis Exchange Parkway, Suite 300, Annapolis, MD, 21401, ISBN 978-1-948939-16-4 (eBook). pp 3 -93

Kevin D. Mitnick, William L. Simon, (2002) The Art of Deception, forwarded by Steve Wozniak. Wiley Publishing, Inc. 10475 Crosspoint Blvd., Indianapolis, IN 46256. ISBN: 978-0-7645-4280-0, Chapter 12, pp 260.

TM, “Developing Story: COVID-19 Used in Malicious Campaigns,” 2020. [Online]. Available: and-malicious-domains. [Accessed: 04-May-2020]

S. P. Berman and J. W. Gately, (2020) “COVID-19 and Its Impact on Data Privacy and Security,”. [Online]. Available: [Accessed: 04-May-2020]

Course Overview (

7 of the Top 10 Vulnerabilities Target Microsoft (

Samarati, M, (2017), Cybercrime cost UK businesses £29 billion in 2016, IT Governance Institute, [Online] Accessed 2nd March at

US Department of Defense (2021)

Cliff Saran, (2015),

Isabella Jibilian, Katie Canales (2021).

Aon (2019), Cyber Security Report, what is now and What is next, [Online] Accessed 3rd March at (2021) (2021)

National Institute of Standards and Technology (2021)””



  • There are currently no refbacks.

Copyright (c) 2022 International Journal of Advanced Research in Computer Science