increasingly the adoption of internet technologies for innovation of quality products and services is growing in leaps and bounds for the customers convenience and comfort without limitation territorial borders and time-space. The cyber-threats have similarly grown targeting and exploiting the vulnerabilities of internet technologies (hardware and software) and gullible customers/users for financial gain (ransomware), theft of intellectual property, disadvantage competitors, reputation damage, among others through tools such as hacking, DDoS, Spearphishing, and social-engineering exploits. Therefore, collective efforts for collaboration involving all actors in continuous shared situation awareness, risk assessment, and risk mitigation by users lessens surfaces for cyber vector attacks and exploits. However, the insider threats withing organisations cannot be wished away background checks of employees, vulnerability analysis/testing, access control and management, strong passwords with expiry periods, policy on physical security and use of biometrics as well as use of BYOD, may enhance cybersecurity