Ongoing infrastructure research

The state of Nigerian enterprise infrastructure security

Measured, not assumed. We map live Nigerian infrastructure — banks, fintechs, healthcare, government, telecom, e-commerce — and publish the aggregate data so the country has an honest picture of where the attack surface actually is.

Updated 2026-04-21 · Weekly refresh · Free aggregate, paid per-org via Snapshot
96
Organizations mapped
2,730
Hosts mapped
6
Sectors covered
31
Systemic findings

Why this matters

Most "Nigerian cybersecurity" coverage is either breach-chasing (what just happened to Sterling, Flutterwave, Patricia) or vendor-marketing (why you need our MSSP). Neither answers the foundational question: across the sectors that matter, what does Nigerian enterprise infrastructure actually look like?

We built the dataset to answer it. DNS enumeration, live-host probing, HSTS coverage analysis, legacy-stack flagging, ASN mapping — applied consistently to 96 Nigerian organizations across banking, fintech, healthcare, telecom, government, and e-commerce. What follows is the aggregate. No exploitation. No speculation. Just what a non-privileged observer can see.

Sector rollup

SectorOrgsHostsAvg HSTS coverage
Banking 9 933
36.5%
Telecom 9 248
31.7%
Government 4 239
30.0%
Healthcare 4 122
12.3%
Fintech 4 117
51.3%
E-commerce 2 104
34.5%

The punchline: healthcare is an outlier on the bad side (12.3% avg HSTS across 122 hosts — the sector of patient data is the sector with the worst baseline). Fintech is the outlier on the good side (51.3% — regulatory pressure from CBN appears to have moved the needle). Banking, telecom, government, e-commerce are all in the 30-37% range — comfortably below what "reasonable security hygiene" looks like in 2026.

Lowest HSTS coverage — orgs with material footprint

The orgs below have 6+ live hosts AND measurable HSTS coverage. Sorted worst-first. This is the list that matters operationally — small orgs fly under any attacker's radar, but anyone with 10+ subdomains IS on the radar and low HSTS is where attackers pivot.

OrganizationSectorHostsHSTSLegacy IIS
Hygeia HMOHealthcare540%0
54geneHealthcare500%0
NCCGovernment1035%14
NITDAGovernment906%2
Zenith BankBanking5910%18
Helium HealthHealthcare616%0
9mobileTelecom3517%0
JumiaE-commerce7917%0
KudaFintech4425%3
Reliance HMOHealthcare1233%0
GTBankBanking8138%18
Access BankBanking38140%19
KongaE-commerce2552%0
First BankBanking5158%14
CBNGovernment4259%8
MTNTelecom5669%1
FlutterwaveFintech3789%1
PaystackFintech3591%0

What this table tells you: two healthcare orgs (Hygeia HMO + 54gene) have exactly zero HSTS coverage across 100+ hosts combined. Two government regulators (NCC + NITDA) are effectively unhardened at 5-6% coverage. The biggest Nigerian bank by host count (Access Bank at 381 live hosts) sits at 40% — better than peers, still not good. The fintech gap between Kuda (25%) and Flutterwave/Paystack (89-91%) shows what regulatory + institutional maturity does to a sector.

Methodology

What we do: DNS enumeration (Amass + DNSX + crt.sh), live-host probing (httpx), HSTS + security-header coverage analysis (per-host), legacy-stack fingerprinting (ASP.NET / IIS version detection from response signatures), ASN ownership mapping, sector classification.

What we don't do: exploitation, authenticated scanning, internal-network probing, data extraction, or any form of active intrusion. Everything on this page is observable from a non-privileged outside position — the same position a potential attacker has on day one.

Cadence: portal refreshes weekly. Methodology details in the companion blog post. Quarterly deep-dive PDF reports start Q2 2026.

What the data means for you

If you run infrastructure for one of the 96 orgs above

Your organization is on the list. The aggregate is public; the per-org detail is not. If you want the full 42-checkpoint scan for your organization — HSTS coverage per host, legacy-stack list, exposed-subdomain map, NDPA 2023 compliance gaps, remediation roadmap — that's our Securva Snapshot product. Starts at $10 USD.

If you're a journalist, researcher, or regulator

The data is free to cite. Email [email protected] with the specific sector / time window you need and we'll send the backing data. We're also drafting a quarterly "State of Nigerian Infrastructure Security" PDF report — first edition lands Q2 2026. Email to be on the notification list.

If you're one of the orgs above and want to understand what you actually look like

Same email. We do coordinated first-party disclosure for free on request — no public shaming, no media, no monetization of the finding. Rotation window standard 14 days.

Securva Snapshot

42-check security + NDPA 2023 audit for any Nigerian organization. PDF report delivered within 24 hours. Starts at $10 USD. Refundable if not useful.

See the Snapshot →

Data growth

This is a living dataset. It grows as we scan. Current coverage spans 6 sectors; Phase 4 (fintech deep-scan) is in progress and will add roughly 15-20 more organizations. Phase 5 (insurance) is next. Phase 6 (edtech) after that. Target: 200+ orgs by end of Q2 2026, 500+ by year-end. Every Phase-N run expands the public portal you're reading now.

If there's a specific organization or sector you think should be on the list, email [email protected]. Additions driven by user requests + our own breach-response rotation.