An overview of cybersecurity in Zimbabwe’s financial services sector [version 2; peer review: 2 approved, 1 approved with reservations]

admin

Keywords cybersecurity, cybercrime, threats, barriers, frameworks As nations, businesses, and individuals rely on the Internet for everyday use, so are cybercriminals manipulating systems to access information illegally and disrupting services for financial gain.The global cost of cybercrime eclipsed one trillion US Dollars in 2020, with Africa losing US $3.5 billion. A quantitative research methodology was…

Keywords

cybersecurity, cybercrime, threats, barriers, frameworks

As nations, businesses, and individuals rely on the Internet for everyday use, so are cybercriminals manipulating systems to access information illegally and disrupting services for financial gain.The global cost of cybercrime eclipsed one trillion US Dollars in 2020, with Africa losing US $3.5 billion.

A quantitative research methodology was adopted to investigate factors affecting cybercrime in Zimbabwean financial institutions.The study focused on the technical aspects of cybersecurity.Data were collected from July 2022 to October 2022, targeting technology experts in the financial services sector.Participants were recruited from 13 institutions to rank cybersecurity constructs, frameworks, and challenges associated with cybersecurity.Data was collected using a questionnaire distributed to participants.Descriptive statistics were used to extract meanings from the responses that measure mean and standard deviation.

Network and data security were the most highly ranked cybersecurity constructs, while physical security was the least.The top three barriers are increasing sophistication of threats, limited skills and emerging technologies, while lack of executive support was the least.

The top frameworks used are the Information Technology Infrastructure Library (ITIL) and Control Objectives for Information and Related Technologies (COBIT), while a fifth is yet to adopt cybercrime frameworks.

The study proposes that financial institutions establish a cybersecurity culture to fight cybercrime, addressing cybersecurity barriers and following best practices.Financial institutions should invest in cybersecurity technologies, train security specialists, and employ a Chief Information Security Officer (CISO).The study’s small sample may affect the generalisability of the results.Financial institutions should implement strategies to raise awareness and collaborate with institutions to train cybersecurity security specialists to close the skills gap.

cybersecurity, cybercrime, threats, barriers, frameworks

I have responded to the issues raised by the reviewers e.g providing a global view of cybersecurity and focusing on Zimbabwe.The other issues related to sampling are aslo addressed.

See the author’s detailed response to the review by Nomusa Dlodlo

See the author’s detailed response to the review by William Vambe

The internet supports today’s knowledge economy and affects every way of life.The internet is growing in volume and complexity, and without due care, it exposes private data and information to criminals.Businesses use information and communication technologies to drive production and automation, while consumers use technology for entertainment and services (

[Maphosa, 2022a](#ref36)).The International Telecommunication Union (ITU) reports that fixed broadband access has increased globally.

In Zimbabwe broadband penetration rose to 59.9% from 0.4% in 2000, while mobile phone penetration surpassed 100% ( [Maphosa, 2022b](#ref66)).Although data costs are still high in Zimbabwe, the last decade witnessed a significant decrease from US $180.00 per giga byte in 2010 to US $15.50 in 2020 ( [POTRAZ, 2021](#ref80)).

Decreasing data costs have fueled teleworking, electronic commerce (e-commerce), distance learning, remote entertainment, and telemedicine ( [Katz and Jung, 2021](#ref30)).The over-dependency on information technology (IT) systems and the rise of e-commerce make societies more vulnerable to cyber-attacks than ever.

Nations, institutions, and individuals utilise cyberspace, a digital or virtual environment where they connect and access digital resources.Devices, networks, and systems that harness information and knowledge for economic development should be secured.Cyberattacks disrupt services and critical infrastructure such as electric grids, water supply and transport systems, banking, and social network systems.Cybersecurity breaches impact national security, economies, and individual livelihoods as attackers leverage the vulnerabilities on multiple devices connected to the internet.

The cost of cybercrime and cybersecurity in 2020 exceeded 1% of the world’s gross domestic product eclipsing one trillion US dollars (

[Sviatun et al., 2021](#ref50)).New forms of businesses purely mediated by the internet, such as crypto-currencies, virtual reality, and cloud computing, have emerged.

The adoption of new technologies such as artificial intelligence, blockchain, and the Internet of Things (IoT), among others, offers the hacker community new methods and skills to breach and undermine the security of organisations that suffer irrecoverable losses ( [Radzikowski, 2015](#ref43)).When systems have been compromised, attackers may lock the data illegally and demand ransoms to restore compromised data.The internet provides significant advantages as customers can flip through virtual online systems to acquire goods and services.

However, criminal elements are lurking, intercepting, and tracking these transactions for fraud.Industry experts report that IoT devices will surpass 75 billion units by 2025 ( [Hejase et al., 2021](#ref91)), offering more opportunities for cybercriminals to breach insecure systems and homes and access sensitive data.

Cyberspace comprises of three layers: infrastructure, software, and data.The infrastructure layer includes physical devices and network equipment, the software layer includes computer systems and applications, and the data layer includes the data held in storage devices.To reduce the impact of cyberattacks, institutions harden cyber resources through software upgrades and patches and train employees, constantly identify vulnerabilities, and mitigate effects through backups.Institutions deploy solutions to protect their cyber resources, from physical security to application and data security.Physical cybersecurity refers to using biometric controls, physical locks, alarm systems, human security guards, and video surveillance cameras to safeguard the tangible cyber assets of an organisation (

[Goldstein, 2016](#ref18)).Cybersecurity controls and measures are applied to an organisation’s cyber applications to reduce the risk of breach.

Data cybersecurity protects the confidentiality, integrity, and availability of cyber data to meet the data user’s requirements.

Network security safeguards systems against unauthorised access.Network cybersecurity refers to measures taken to protect data during transmission over interconnected networks (Awodele, Onuiri, and Okolie, 2012).Network cybersecurity entails enforcing policies and modifying the network architecture to include security controls such as firewall rules, intrusion detection, monitoring, and patch management.

Identity theft is the illegal use of another person’s private information for fraud.It involves impersonating an individual’s identity to steal personal information, including banking details, credit cards, and social security information (

[Arachchilage and Love, 2014](#ref5)).Phishing is a social engineering technique where an attacker seeks to access a legitimate user’s credentials illegally or personally sensitive information by impersonating electronic communications from a trusted source ( [Jakobsson and Myers, 2006](#ref69); [Jang-Jaccard and Nepal, 2014](#ref26)).During phishing, an unsuspecting victim is redirected to a malicious website after receiving an email with an embedded link using social engineering techniques ( [Gupta et al., 2015](#ref20)).

Malware refers to software programs illegally installed on a victim’s computer to steal identifying information and cause malicious damage to cyberinfrastructure.

Developed countries have enacted effective cybersecurity frameworks and policies to strengthen operations, raise awareness and support training programmes (

[Russell et al., 2017](#ref81)).Countries such as the United States of America (USA), Australia, Canada and the United Kingdom (UK) use cybersecurity to secure and fortify critical infrastructure which drives socioeconomic development ( [Catota et al., 2019](#ref72)).The USA’s National Security Agency fortified its cybersecurity posture by setting academic centres of excellence to lead in cybersecurity research and quality education, disseminate information, lead the country in cybersecurity best practices and spearhead public and private sector partnerships ( [Kallberg and Thuraisingam, 2012](#ref75)).The Australian Federal Police’s computer crimes unit collaborates with foreign intelligence units to respond to cyberattacks on the country’s national infrastructure and digital assets ( [Smith and Ingram, 2017](#ref82)).The European Union’s NATO warned potential cyber criminals that the bloc had a full range of capabilities to detect cybercrime and respond to all threats using all possible means ( [Goel, 2020](#ref73)).The UK adopted a large scale cybersecurity framework that shows the government’s ability to detect and defend its infrastructure against cyberattacks, involving collaborations with the private sector, military and educational institutions ( [Neville-Jones and Phillips, 2012](#ref79)).

Despite the unprecedented adoption of ICTs in the last two decades ( [Maphosa, 2022b](#ref66)), developing countries lag in the adoption of cybersecurity frameworks and policies.[Kabanda (2019)](#ref74) noted that cybersecurity systems in Africa are underdeveloped due to limited infrastructure, lack of funding, inadequate policies and legislation, lack of education and awareness, and limited reporting and data-sharing platforms.Only 11 African countries have cybersecurity policies ( [Kshetri, 2019](#ref56)).

As banks go digital, customers use electronic devices to conduct banking services such as creating accounts, conducting financial transactions and paying bills anytime and anywhere, increasing exposure to cybercrime.Most of Africa’s economy is informal; therefore, cyberattacks target financial institutions and mobile network operators who drive the mobile money ecosystem (

[Mukiibi, 2019](#ref57)).The outbreak of the COVID-19 pandemic forced organisations to shift from the physical to the virtual environments to deliver services ( [Maphosa, 2021](#ref35); [Maphosa, 2022b](#ref66)), putting a strain on cybersecurity.Cybercrimes continue to increase despite the availability of technical cybersecurity infrastructures such as firewalls, encryption, and antiviruses.Developing countries should strengthen cybersecurity measures as attacks on critical infrastructure are rising.Africa loses over four billion USD annually to cybercrime; other critical losses include data, intellectual property, reputation, and brand name ( [Weforum, 2022](#ref63)).

According to the national cybersecurity index (CGI), a global tracker of countries’ progress in cybersecurity, Zimbabwe is ranked 129th due to a lack of policies that support the cybersecurity (

[NCSI, 2021](#ref84)).

Cybersecurity breaches are rising in Zimbabwe due to a lack of a national cybersecurity implementation plan and strategy in Zimbabwe ( [NCSI, 2021](#ref84)).Not much has been done in cultivating a cybersecurity culture and combating cybercrimes in Zimbabwe.Zimbabwe has a massive shortage of cybersecurity specialists and this is compounded by the lack of frameworks and policies to drive national implementation programmes.[Kabanda (2019)](#ref74) notes that cybersecurity is regarded as an afterthought and is usually not part of the core business strategies and this is worsened by the unprecedented brain drain of skilled personnel in Zimbabwe.

Zimbabwe faces challenges such as a lack of programmes and opportunities to equip the general public with skills, knowledge and awareness to fight cybercrime ( [Mutunhu et al., 2022](#ref78)).Zimbabwe’s Cyber Security and Data Protection Bill promulgation is a critical step in fighting cybercrime, but it has been widely criticised and viewed as a tool for the State to gag and muzzle civil society and the media in the fight against corruption ( [Transparency International, 2020](#ref83)).There is a need to involve non-state actors in the development and review of the Bill.

In a 2018 survey, 64% of industry leaders acknowledged that organisations had failed to manage cybersecurity risks; therefore, improvements were proposed (

[Deloitte, 2018](#ref10)).

This calls for researchers to propose and evaluate technical cybersecurity solutions for combating cybercrime.The study aims to assess the state of cybersecurity in a developing country to raise awareness and compliance and fight cybercrime.

The study also adds to the dearth of literature from developing countries on cybercrime.

Cyberspace is the fastest evolving technology in human history, where new emerging platforms such as IoT, social media, big data, and cloud computing provide new threats and opportunities.Despite the recent adoption of digital platforms in Africa, organisations still need to prioritise cybersecurity; unfortunately, only a few have developed comprehensive policies to improve security.Criminals have expanded their attacks as many systems are vulnerable due to lax cybersecurity practices in most African countries.

[Mukiibi (2019)](#ref57) reported that less than ten African countries have cybersecurity legislation.In 2018, only 13 of the 54 African countries had Computer Emergency Response Teams (CERT), and 14 had personal data protection laws ( [AUC, 2018](#ref68)).By 2022, 29 of the 54 African countries had cybersecurity legislation ( [Weforum, 2022](#ref63)).

[Mukiibi (2019)](#ref57) reports that only 18 countries have Computer Security Incident Response Teams (CSIRTs).As a result, many organisations are vulnerable, and assessment results revealed that only 52% of African companies could handle large-scale cyber-attacks ( [Weforum, 2022](#ref63)).In the 12 months ending February 2021, South Africa had 230 million attacks, followed by Kenya and Morocco, which recorded 72 and 71 million attacks, respectively ( [KPMG, 2022](#ref70)).Interpol reports that 90% of African businesses have no cybersecurity protocols to protect their businesses, leaving them vulnerable to threat actors ( [Weforum, 2022](#ref63)).Zimbabwe and Libya had 90% of counterfeit and pirated software, the highest percentage, accelerating the spread of malware and system breaches ( [Weforum, 2022](#ref63); [Kshetri, 2019](#ref56)).

Cybercrimes are known as crimes of the Internet; specifically, they refer to criminal activities perpetrated through computer-related devices in cyberspace (

[Kharb, 2017](#ref32)).As more workers took their computers to work from home during the COVID-19 pandemic, industry experts report that cyberattacks quadrupled (Menn, 2020).The World Economic Forum reports that cyberattacks increased to 125% globally in 2021, and indications show an upward increase in 2022 ( [Weforum, 2022](#ref63)).

Ever since the outbreak of the COVID-19 pandemic, cybercrimes have increased by 300%, costing the world over six trillion USD ( [Hejase et al., 2021](#ref91)).[Sviatun et al.(2021)](#ref50) reported that 87.6% of cybercrime attacks targeted the financial sector, with the retail industry coming second with 82.7%, while the communication and technology sector had 81.9%.African businesses face cyber threats such as online scams, ransomware, botnets and email compromise ( [KPMG, 2022](#ref70)).The most common cybercrimes in Zimbabwe are identity theft, hacking, email phishing, and malware victimisation ( [RBZ, 2015](#ref42)).

A study carried out by

[Kahn and Roberds (2008)](#ref27) showed that identity theft was driven by the need to steal money on one side and the need to avoid being monitored.[Alkhalil et al.(2021)](#ref4) postulated that phishers attack a technical system by tricking employees into clicking on malicious links or downloading harmful files to steal their private information required to commit fraud.

[Molinaro and Bolton (2018)](#ref37) highlighted the importance of the double lens model in preventing phishing attacks.Hacking has been attributed to low self-control ( [Kranenbarg, Holt, and Gleder, 2017](#ref34)).[Odunze (2018)](#ref39) employed the differential association theory and the routine activity theory to explain hacking and found that women were more vulnerable to hacking than their male counterparts due to the prevalence of romance scams.

Cybersecurity combines procedures and processes to protect infrastructure, systems, and data from cyberattacks.Cybersecurity ensures data integrity and confidentiality by guarding against unauthorised access to sensitive information (

[Mukiibi, 2019](#ref57)).

Cybercriminals exploit flaws and other vulnerabilities in emerging technologies to counter security offered by firewalls, antivirus scanners, and data encryption tools ( [Jang-Jaccard and Nepal, 2014](#ref26)).On average, organisations are paying US $3.6 million per attack, with ransomware attacks increasing by 151% as organisations witnessed a 31% increase in attacks ( [Bissell et al., 2021](#ref7)).

A major cyber-attack on a power grid left over 1.4 million people without electricity in Ukraine ( [Knake, 2017](#ref33)).Financial institution systems have become a significant target for hacking, phishing, malware, and identity theft ( [Weforum, 2022](#ref63)).Industry trends show exponential cyber-attack growth; Price Waterhouse Cooper (PWC) reported that 93% of financial institutions suffered security breaches in 2016 ( [Airehrour, Vasudevan, and Madanian, 2018](#ref3)).The financial services sector can become bankrupt after a security breach, with millions of dollars demanded to pay lawsuits and settle ransomware ( [Reddy and Reddy, 2014](#ref44)).After a phishing attack in 2017, the Bank of India lost US $170 million ( [Acharya and Joshi, 2020](#ref1)).Another bank in Brazil lost US $243 million to cyber criminals ( [Tabassum, 2020](#ref51)).

Industry experts reported that Africa lost over US $3.5 billion in 2017, with Nigeria accounting for 18.5% (US $649m), Kenya losing 6% (US $210m), and South Africa losing 4.5% (US $157m) through cyberattacks ( [Kshetri, 2019](#ref56)).Klynveld Peat Marwick Goerdeler (KPMG) reported that Kenya’s interconnected supply chain networks had suffered ransomware attacks ( [KPMG, 2022](#ref70)).In contrast, its banking sector has suffered from distributed denial-of-service (DDoS) attacks.Cyber threats have disrupted South Africa’s maritime infrastructure, and its cities’ social services payment systems have suffered ransomware and data breach ( [KPMG, 2022](#ref70)).

In 2018, over 4,000 cases of cybercrime were handled by Zimbabwean police, and the country lost US $40 million to cybercrime in 2018 ( [Bulawayo24, 2021](#ref71)).

Cybercriminals target and exploit technical vulnerabilities and pry on users with limited cyber training or ethics to breach systems.Physical security is achieved using human guards, video surveillance cameras, physical locks, and biometrics to protect cyberspace.

[Skopak and Sakanovic (2016)](#ref50) confirmed that physical security is necessary to protect information resources comprehensively.[Kazemi (2018)](#ref31) asserted that physical security was among the factors helping to preserve confidentiality.This view was supported by [Elnaim (2016)](#ref14), who found out that physical security helped to protect information against attacks.

[DiMase et al.

(2015)](#ref11) highlighted the importance of physical security in denying access to hardware resources.[Georgiadou et al.(2021)](#ref17) reported that it was easy to control machines as they were more predictable than humans.There is growing interest and broader emphasis on human factors in the fight against cybercrime.

As financial institutions move some of their services online, potential breaches and security attacks increase exponentially.

[Reaves et al.(2015)](#ref45) analysed branchless banking applications and reported increased cybersecurity threats.[ENISA (2016)](#ref15) showed that application security influences cybersecurity.[Elkhodr et al.

(2012)](#ref13) proposed improving mobile banking’s application security in Australia and found that mobile application security significantly impacted cybersecurity.[Ahluwalia (2016)](#ref2) postulated that biometrics were pivotal in mitigating cybersecurity breaches.Experimental results from a study conducted by [Zhang and Wang (2010)](#ref55) showed that network security performance contributed to cybersecurity.

Globally, internet traffic increased by over 30%, with significant changes in geographic distributions of the connections from enterprise locations to residential access (

[Katz, 2020](#ref29)).As workers move to work from home due to COVID-19 and flexible working in line with 21st-century jobs, vulnerabilities intensify, and measures are required to protect data during transmission over interconnected networks.[Gyabi and Shrivas (2016)](#ref19) used encryption to secure data in the rural bank of Ghana.A simulation analysis by [Hossain et al.(2017)](#ref23) revealed that data security in the cloud could be achieved through encryption and a location-based salt algorithm.

[Durumeric et al.

(2017)](#ref12) sought to avoid HTTPS interception through heuristics deployed on different networks.A study carried out by Subramanian and John (2017) revealed that a data security algorithm reduced malicious insider attacks.[Kaiwartya et al.(2017)](#ref28) investigated biometric Internet security and found it suitable for Internet authentication.[Tseng et al.(2015)](#ref53) realised the importance of internet security and proposed an anti-phishing-based video game to enhance the learners’ internet security.

This study received ethical approval from the Lupane State University Institutional Ethics Committee (LSU00022).

The online questionnaire explained the research objectives, participants’ expectations, voluntariness and respondents’ anonymity.Participants gave their written consent before participating in the online survey.

The study applied a descriptive quantitative survey design.The comprehensive literature review identified critical technical factors influencing cybersecurity, such as physical security, data security, application security, network security, and internet security.These factors shaped the thrust of the study.

The study’s questionnaire was adapted from the International Organization for Standardization (ISO)/International Electrotechnical Commission (ISOC/IEC) (

[ISOC/IEC, 2012](#ref24)).ISOC/IEC is a task force responsible for crafting and reviewing industry-wide cybersecurity standards after every five years.Since the targeted participants are professionals with post-secondary education, the questionnaire was administered in English, the country’s official language.

A pilot study was conducted to verify the questionnaire’s appropriateness and completeness and gauge the meaning of the questions (

[Maphosa, 2023c](#ref67)).The instrument was piloted in June 2022 to six network and security personnel at the University.Participants made comments and suggestions on the online questionnaire, which the researcher captured.This ensured that the questions were not ambiguous, difficult to answer or prone to many interpretations, which could lead to biased responses.

Before the survey instrument was disseminated, some questions were edited to ensure clarity and answerability, while some were re-arranged to improve the flow of responses.Other changes involved altering some binary responses ‘yes’ or ‘no’ to the Likert scale type and providing options to other questions.

The final questionnaire contained two key sections with 38 items based on the literature reviewed.Cybersecurity literature and security governance standards were contextualised to the Zimbabwean context to develop the questionnaire.Data were collected from early July 2022 to early October 2022.Section A contains the respondent’s age, financial institution’s name, and gender profile as shown in Appendix A.Section B consisted of the main questions on a five-point Likert scale ranging from 1 = Strongly Disagree to 5 = Strongly Agree (

[Maphosa, 2023b](#ref57)).

The study targeted IT experts from the country’s financial institutions comprising commercial banks, merchant banks, discount houses, building societies, and finance houses.The survey questionnaire for the study was self-administered to IT experts in the financial services sector to obtain an overview of cybercrime.Electronic mail was sent to personnel in the networks and infrastructure departments of the randomly selected financial institutions.

Professional networks such as LinkedIn and Twitter and distribution lists such as the Computer Society of Zimbabwe and the Internet Society of Zimbabwe were used.Convenience sampling was used to recruit participants.The sample includes participants working in the networks and infrastructure department within their financial institutions.Data were collected electronically and stored in Google Drive, which was password encrypted.

The 76 responses received were from ICT managers (16), network security specialists (12), database and systems administrators (10), developers (28), and risk and compliance officers (10), giving an 84.4% response rate.Most (72%) respondents were male, while about a third were female.More than half of the respondents had an undergraduate degree, as shown in

[Table 1](#T1).

The average age of the respondents was 29 years, while the IT experience in the financial services sector was 9.5.The respondents’ names and those of their financial institutions were kept anonymous ( [Maphosa, 2023a](#ref56)).

The study evaluated cybersecurity security constructs for initial threat areas from physical security to data security.The study used descriptive statistics and percentages to measure the constructs’ means and standard deviations (SD).The mean and the SD of the cybersecurity constructs are shown in

[Table 2](#T2).The mean values ranged between 3.699 and 4.854, while SD values ranged between 0.655 and 0.779.

Participants ranked network security highly, with a mean of 4.854 and a standard deviation of 0.739.

The following ranked construct was data security, with a mean of 4.739 and an SD of 0.655.The penultimate construct was identity theft, with a mean of 3.802 and an SD of 0.715.The last ranked construct was physical security, with a mean of 3.699 and an SD of 0.770.Physical security is easily fortified through security guards, CCTV, biometrics, electronic locks or other related devices.

Respondents ranked the framework used by their financial institution; almost half (44.74%) used the Information Technology Infrastructure Library (ITIL), followed by Control Objectives for Information and Related Technology framework (COBIT), with 36.84% and about 10.53% of the institutions adopted other frameworks as shown in

[Table 3](#T3).

[Figure 1](#f1) shows the top cybersecurity barriers, which include increasing sophistication of threats (89.5%), limited technical skills (85.5%) and emerging technologies (81.6%).The least ranked barriers are lack of executive support (22.4%), lack of adequate budget (30.3%) and lack of cybersecurity policies (53.9%).

The top three barriers for this study are increasing sophistication of threats, limited skills and emerging technologies.Insufficient cybersecurity personnel, limited budgets, and executive support followed these.

Financial institutions should adopt cybersecurity policies and engage in extensive end-user training programmes to fight cybercriminals.This study confirmed the findings by

[Norris et al.

(2019)](#ref60), who established that lack of skills, inadequate policies, limited funding and management support impacted cybersecurity.Institutions must balance the drive to increase revenues and reduce operating costs while ensuring compliance and investing in cybersecurity frameworks.

The high ranking of network security aligned with findings by

[Praveena and Smys (2017)](#ref40), who identified network security as a substantial concern in protecting financial information.[Acharya and Joshi (2020)](#ref1) also contended that networks should be audited at fixed intervals to test for security breaches.[Bendovschi (2015)](#ref6) also ranked data security highly, noting that when organisations lose their data, they lose their market share and customer relationship.

Verizon reports that 37% of security breaches resulted from identity theft, while social engineering or phishing accounted for 22% ( [Verizon, 2020](#ref65)).[KPMG (2022)](#ref70) recommended that organisations perform penetration tests regularly and demonstrate response and readiness to evaluate the institution’s network security.

The minimal technical skills mean institutions have limited capacity to secure networks and information systems, configure servers, recover data, and continuously scan for vulnerabilities and remediation.

[Figure 1](#f1) shows the barriers to cybercrime in line with [Norris et al.(2019)](#ref60), who ranked cybersecurity management barriers as limited technical skills caused by the inability of institutions to pay competitive salaries.The findings align with observations by the World Economic Forum, which reported that only 53.7% of African countries had cybersecurity policies ( [Weforum, 2022](#ref63)).The establishment of cybersecurity policies demonstrates management’s intent to create a security conscious culture and provide guidance to employees.[Cavusoglu et al.

(2004)](#ref9) lamented that most African countries needed meaningful budgets to support cyber security.Although management support was lowly ranked, none of the financial institutions had established a Chief Information Security Officer (CISO) to handle cybersecurity issues at a strategic level.

Management support also influences budgetary allocations and prioritises cybersecurity issues within the institution.[Richards (2014)](#ref45) noted that organisations had established the CISO to strengthen the institution’s cybersecurity portfolio, managing enterprise cybersecurity risks and mitigation measures to maintain the institutional brand.

Cybercriminals rely on sophisticated technologies that are difficult to detect and threaten even the savviest targets (

[Microsoft, 2020](#ref39)).The lack of policies hinders sharing cybersecurity information between institutions, resulting in fragmented knowledge across the domain.[Caulkins et al.

(2018)](#ref8) also identified a lack of cybersecurity personnel globally, affecting the availability of skilled and experienced staff who can handle cybersecurity tasks and challenges.Financial institutions should train and retain cybersecurity specialists to fight cybercrime.[Microsoft (2020)](#ref39) identified emerging threats, such as using AI-enabled capabilities to commit cybercrime and the increased adoption of IoT and teleworking.Such tools are available on the black market and online.Financial institutions can take practical steps to raise awareness and training and ensure that cybersecurity frameworks are adopted.

Lack of cybersecurity awareness by employees can have devastating consequences on the organisation as they can quickly become a security loophole if they are not concentrating, are distracted, or are stressed.This aligns well with [KPMG’s (2022)](#ref70) recommendations, which suggested that institutions conduct cyber awareness and training, establish firewalls and maintain backup while ensuring their security systems have the latest patches.

Developing countries have rapidly increased access to cyberspace, without corresponding effort to fortify cyberspace and improve security measures deter cybercrime (

[Muller, 2015](#ref77)).The results show that about a fifth (19.74%) of the financial institutions are yet to adopt cybercrime frameworks, this is worrying as public funds and investments are exposed to risks.

The most common cybersecurity frameworks in Zimbabwe are the ITIL and COBIT, while other frameworks such as the NIST and ISO 27002 are quickly gaining recognition.

The study has the following limitations.

The small sample size impacts the generalisability of the findings; more responses would have improved the value of the study’s findings.

Using a quantitative data collection approach may have restricted the probing of participants to elicit more information and further explain specific responses.The use of self-reported data raises fears that participants could have portrayed a positive outlook on the image of their institution since data breaches are sensitive in the financial services sector.

Literature shows that cybercriminals constantly attack financial institutions, yet results show that their cybersecurity practices are poor.As technology evolves, the means and opportunities to commit cybercrime also increase, and therefore, many organisations will suffer security breaches leading to irrecoverable losses.The study provides an overview of Zimbabwe’s cybersecurity landscape and threats while providing a roadmap to manage cybercrime in other developing countries with a similar socioeconomic environment.Research has been conducted to identify the motivations, techniques, and countermeasures to cybercrime; however, there is no single solution due to the heterogeneous nature of the attack vector.

Financial institutions should embrace a strong awareness culture, invest in cybersecurity technologies, train security specialists, and employ CISOs and executives knowledgeable in cybersecurity.

The study established technical factors such as physical security, application security, data security, network security, and internet security.Network security and data security were the highly ranked cybersecurity constructs, while physical security was the least ranked.There are several barriers that financial institutions face in managing cybercrime.

The top three barriers are increasing sophistication of threats, limited skills and emerging technologies.The top frameworks used by financial institutions are the ITIL and COBIT, while about a fifth are yet to adopt cybercrime frameworks.

The study’s small sample may affect the generalisability of the results.The study focused on technical aspects of cybersecurity, and future studies could focus on social engineering aspects that compromise the security of systems.This study raises awareness of the ever-present cybersecurity threat in the financial services sector.

The study provides a baseline on the state of cybercrime in developing countries.More research will be required to validate these findings by developing models and using advanced statistical analysis on independent and dependent variables to test for causality and correlation.

The Government should proactively provide an environment that supports cybersecurity research and reporting of cases so that institutions can learn from others and continuously improve their detection and protection systems.The study recommends developing a national cybersecurity framework for an improved cybersecurity strategy for protecting Zimbabwean financial institutions.This framework must include establishing a cybersecurity culture, addressing cybersecurity barriers and following best practices such as adopting frameworks and establishing the office of the CISO.This will improve the protection of critical assets, minimise service disruption and loss of resources and strengthen financial institutions’ public confidence and reputation.The practical implication of this study is improving cybersecurity risks, given the rising adoption of emerging technologies and frameworks that support participation in the global economy.More awareness and education programmes are required to equip cyberspace users.

A cybersecurity culture should be developed in the early stages of schooling such as the primary school level.There should be deliberate effort to grow cybersecurity skills which are extremely important to the financial services sector and are in short supply due to the brain drain.The government and the private sector should partner to set up CERT for the financial services sector and other sectors.The cybersecurity bill should be flexible to allow for the continuous review of the roles played by the state and non-state actors and align with the dynamic threat levels.Tax rebates on cybersecurity equipment are required to ensure that organisations can invest in basic cybersecurity equipment.

Future studies could investigate the effects of social media-based cybercrimes as emerging threats are predicted to increase significantly over the following years.The government should also implement and strengthen policies, laws and legislations that curb cybercrime to mitigate economic losses.

Financial institutions must create strategies to raise awareness of cybercrime and collaborate with higher education institutions to introduce programmes addressing cybersecurity challenges to close the skills gap.Financial institutions can use social media platforms for cybersecurity literacy and awareness.

|Views||Downloads|

|F1000Research||-||-|

| PubMed Central |

Data from PMC are received and updated monthly.

|-||-|

Provide sufficient details of any financial or non-financial competing interests to enable users to assess whether your comments might lead a reasonable person to question your impartiality.Consider the following examples, but note that this is not an exhaustive list:

Sign up for content alerts and receive a weekly or monthly email with all newly published articles

Already registered?

[Sign in](/login?originalPath=)

The email address should be the one you originally registered with F1000.

You registered with F1000 via Google, so we cannot reset your password.

To sign in, please click

(#).

If you still need help with your Google account password, please click

here.

You registered with F1000 via Facebook, so we cannot reset your password.

To sign in, please click

(#).

If you still need help with your Facebook account password, please click

https://www.facebook.com/recover/initiate.

If your email address is registered with us, we will email you instructions to reset your password.

If you think you should have received this email but it has not arrived, please check your spam filters and/or contact for further assistance..

Leave a Reply

Next Post

Best Bitcoin Casinos with VIP Offers In 2024

DAILY NEWSLETTER Your daily dose of Crypto news, Prices & other updates.. Bitcoin VIP casinos provide loyal players with a range of rewards and benefits for continued play at their sites. There are so many great cryptocurrency casinos on the market with VIP offers but we have conducted our own thorough research to remove the…
Best Bitcoin Casinos with VIP Offers In 2024

Subscribe US Now