Cybersecurity: A governance framework for mobile money providers

| September 10, 2019

article image
The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with nearly 400 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent industry sectors. The GSMA also produces the industry-leading MWC events held annually in Barcelona, Los Angeles and Shanghai, as well as the Mobile 360 Series of regional conferences.

Spotlight

Nerd Force

Nerd Force has always positioned itself at the forefront of IT changes to be able to offer the best services to its clients. Nerd Force provide and support variety of cloud solutions including but not limited to Google Apps and Microsoft 365. Cloud Computing is the new emerging wave technology that deliver a new level IT efficiency and scalability. Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are all part of Cloud Computing. Cloud computing enables the users to have access to application software such as Word, Excel, PowerPoint and similar software and more without buying the license and installing it on computer system. With a simple internet connected computer a user may access the same information and computing power, files and applications in a cloud-computing environment.

OTHER ARTICLES

A 4 Step Guide to Stronger OT Cybersecurity

Article | April 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time. Industrial control system (ICS) networks are categorized as high risk because they are inherently insecure, increasingly so because of expanding integration with the corporate IT network, as well as the rise of remote access for employees and third parties. An example of an IT network within a control system is a PC that’s running HMI or SCADA applications. Because this particular PC wasn’t set up with the initial intention of connecting to IT systems, it typically isn’t managed so can’t access the latest operating system, patches, or antivirus updates. This makes that PC extremely vulnerable to malware attacks. Besides the increased cyberthreat risk, the complexity resulting from IT–OT integration also increases the likelihood of networking and operational issues.

Read More

Protecting against Cybersecurity Threats when Working from Home

Article | March 11, 2020

With the spread of the novel coronavirus (COVID-19), many organizations are requiring or permitting employees to work remotely. This post is intended to remind employers and employees that in the haste to implement widespread work-from-home strategies, data security concerns cannot be forgotten.Employers and employees alike should remain vigilant of increased cybersecurity threats, some of which specifically target remote access strategies. Unfortunately, as noted in a prior blog post, cybercriminals will not be curtailing their efforts to access valuable data during the outbreak, and in fact, will likely take advantage of some of the confusion and communication issues that might arise under the circumstances to perpetrate their schemes. Employees working from home may be accessing or transmitting company trade secrets as well as personal information of individuals. Inappropriate exposure of either type of data can lead to significant adverse consequences for a company.

Read More

Cybersecurity Must Be Embedded in Every Aspect of Government Technology

Article | March 17, 2020

Cybersecurity has never been more important for every level of our government. The hacking attempts at major federal agencies have raised the profile of nefarious actors who use their highly advanced cyber skills to exploit both security and the vulnerabilities created by human error. Just last month, the Department of Defense confirmed that computer systems controlled by the Defense Information Systems Agency had been hacked, exposing the personal data of about 200,000 people. Additionally, the Department of Justice recently charged four members of the Chinese military for their roles in the 2017 Equifax breach that exposed the information of 145 million Americans. The hackers were accused of exploiting software vulnerability to gain access to Equifax’s computers. They are charged with obtaining log-in credentials that they used to navigate databases and review records.

Read More

Covid-19 cyber security threat to impact businesses

Article | April 1, 2020

With millions of employees having to work from home, companies are having to look at how to keep as many business-critical functions running as possible while at the same time maintaining adequate security. “In the last week alone, we have seen phishing emails go from 25,000 a day to 125,000 – a 500 per cent increase – which means the risk is real," explains Andrew Jackson, CEO of Intercity Technology. "Whilst firewalls included within domestic broadband routers are considered sufficient for personal use and occasional homeworking, they’re not necessarily capable of withstanding prolonged periods of remote working from a large proportion of the workforce, which is why we are seeing more businesses and their employees become the targets of malicious hackers. "Just because employees are now home based doesn’t mean that security and privacy regulations such as GDPR are null and void and therefore, working closely with a trusted IT security partner is vital to help mitigate against any potential risks.

Read More

Spotlight

Nerd Force

Nerd Force has always positioned itself at the forefront of IT changes to be able to offer the best services to its clients. Nerd Force provide and support variety of cloud solutions including but not limited to Google Apps and Microsoft 365. Cloud Computing is the new emerging wave technology that deliver a new level IT efficiency and scalability. Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are all part of Cloud Computing. Cloud computing enables the users to have access to application software such as Word, Excel, PowerPoint and similar software and more without buying the license and installing it on computer system. With a simple internet connected computer a user may access the same information and computing power, files and applications in a cloud-computing environment.

Events