The Trust Trap: When Cybersecurity Becomes the Threat


You've done everything right. You've installed the best antivirus software, used a VPN, enabled two-factor authentication, and even paid for premium cybersecurity services. You feel invincible. But what if I told you that your cybersecurity tools might be the very things putting you at greatest risk?
This paradox hit Daniel, a business owner, when he discovered that his trusted VPN service had been logging and selling his browsing data for years.
The tool he paid to protect his privacy had become his biggest privacy violator.
The Truth about the Cybersecurity Industry
The truth is, not all security companies are secure, and not all privacy tools protect privacy. Some deliberately collect the data they promise to protect, while others have such poor security practices that they become attractive targets for the very criminals they claim to defend against.
This creates a dangerous trust trap where our desire for security makes us vulnerable to new forms of exploitation.
The VPN Deception
Virtual Private Networks (VPNs) are supposed to hide your internet activity from prying eyes. But many VPN providers:
Log your browsing data despite "no-logs" policies.
Sell user data to advertising companies.
Operate from countries with weak privacy laws.
Use inadequate encryption that can be easily broken.
Get breached themselves, exposing all user data.
Samuella, a journalist, chose a VPN to protect her sources and research. She later discovered that the same VPN was sharing user data with governments, potentially compromising the very people she was trying to protect.
The Antivirus Paradox
Traditional antivirus software requires deep system access to function effectively. This creates several problems:
Some antivirus programs collect more personal data than the malware they block.
They can slow down systems significantly, creating productivity costs.
Free antivirus programs often make money by collecting and selling user data.
Some antivirus companies have been caught installing backdoors in their software. (Kaspersky Lab and NSO Group’s Pegasus)
Think of a backdoor like a secret way into your phone or computer that someone creates on purpose, often without your knowledge. This enables them to bypass your passwords and security whenever they want and without detection.
The irony is stark: software designed to protect against spying often does the most comprehensive spying of all.
The Password Manager Trap
Password managers are essential for modern security, but they also represent single points of catastrophic failure. This is what happens when they get breached:
Criminals gain access to all your passwords at once.
Your most sensitive accounts become vulnerable simultaneously.
The damage can be devastating and immediate.
The Trust issues in Nigeria’s Cyberspace
As Nigerians, we face unique challenges in the cybersecurity trust trap:
Limited local cybersecurity companies mean relying on foreign services with unknown data practices.
Economic factors often push us toward free or cheap security tools that monetize through data collection.
Less regulatory oversight means fewer protections when security companies behave badly.
Cultural trust in "Western" technology companies, which overrides healthy skepticism.
The Social Engineering of Trust
Some cybersecurity companies exploit our fear and trust simultaneously. They:
Use fear-based marketing to sell unnecessary services.
Make bold privacy claims they don't actually honor.
Create complex terms of service that hide data collection practices.
Use security facades to appear more protective than they actually are.
Breaking Free from the Trust Trap
- Research Before You Trust
Read independent security audits, not company marketing materials (As most of us do).
Check if companies undergo regular third-party security assessments.
Research the company's data handling history and any past breaches.
Verify claims about encryption, logging policies, and data storage.
- Diversify Your Security Strategy
Do not put all of your security eggs in one basket; use multiple tools from different companies.
Regularly rotate between service providers.
Maintain offline backups of critical security information.
- Trust but Verify
Monitor your accounts for unusual activity even when using security tools.
Regularly audit what data your security tools are collecting.
Read and understand privacy policies, especially for security services. (Tedious? sure, but might just be what saves you from making a horrible mistake.)
Use transparency reports to understand how companies handle government requests.
The Solution
Personally, I advocate for a "trust-minimizing" approach. You can use security tools, but assume they might be compromised.
Design your security strategy so that no single tool failure can destroy you." This means:
Using open-source security tools where possible
Regularly changing security providers
Maintaining multiple layers of protection
Staying informed about security industry news and breaches
Reclaiming the Agency
The goal isn't to avoid cybersecurity tools: it's to use them wisely. Security isn't about blind trust in products or companies; it's about understanding risks, making informed choices, and maintaining healthy skepticism even toward your protectors.
In a world where even the guardians need guarding, your most powerful security tool is your ability to think critically about who you trust and why.
Subscribe to my newsletter
Read articles from Oghenemaro Ikelegbe directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Oghenemaro Ikelegbe
Oghenemaro Ikelegbe
I am a passionate, self-starting individual and with a goal-driven and ambitious mindset. I value collaboration and strive to foster a cohesive work environment that encourages collective success. Balancing professional pursuits with personal values, I prioritize religion, relationships, and loved ones. In leisure time, I enjoy reading and taking walks, finding joy in simplicity and continuous learning.