Stefan
-
-
-
After your home gets broken into, it might be obvious if the intruder came in through a broken window or smashed down the back door. Shattered glass and forced entry are observations that lead you to the conclusion of a home burglary. In the cyber world, these signals might not be as evident. How did my files get locked in a ransomware attack? Ransomware attacks can happen to a business when they fail to follow common cyber security frameworks such as:
• Choosing strong passwords
• Enforcing access management controls
• Security awareness training for employees
• Using EDR (Endpoint Detection and Response) or antivirus software
• Updating operating systems and hardwareCyber criminals use several methods to access your network (attack vectors) by exploiting vulnerabilities on your network. An effective way to prevent a ransomware attack is for your business to understand these attack vectors, and be proactive with stronger cyber security.
Overall, ransomware is stealing headlines. And there is a reason to all the hype. The malware attack that takes over computer networks is a growing problem for organizations of all sizes. And “bad guys” are turning ransomware into big business. The FBI estimates the attacks
to be a US$1 billion industry as of 2016. So what can organizations do to protect themselves? -
Nowadays customers expect to receive prompt responses to
enquiries and complaints around the clock and from an
array of channels. No doubt this proved to be a challenge
during the pandemic for many enterprises who had to deal
with staff shortages and where call centres had to close. -
Achieving this trust and delivering a compelling CX relies
heavily on the IT security measures that a business has in
place. This security must cover everything from the commu- nication channels being used through to the payment gate- ways used to process transactions. - Asia-Pacific I 2022
Become cyber resilient: What you need to know about this powerful anti-cybercrime strategy
by StefanAlthough not a new concept, many organisations have only
implemented components of cyber resilience. A common
misconception is that cybersecurity is centred around technology. While technology plays a critical role, other business areas – employees, supply partners, and more have
responsibility for security. - Asia-Pacific I 2022
Why it’s past time to take the threat of SIM swapping attacks seriously
by StefanProviding SIM access is highly lucrative as there is such a
high demand for it. Individual SIMs may be sold at a flat
rate of around US$200-$400 but are often sold for a portion
of the proceeds, dependent on the amount in the victim’s
bank account. -
Ransomware has the potential to be even more devastating
if it’s spread via Active Directory (AD). In recent years, a
number of ransomware operators have concentrated their
focus on AD as a core step in their attack path. -
- Asia-Pacific I 2022
The misconceptions of the hacking epidemic and how identifying them can protect your business
by StefanContrary to popular discourse, cyber disasters cannot be
measured merely by sophistication. Often the most alarming
attacks can be low-level phishing emails that entice people
to open malicious attachments – a method which has
become so easily-exploitable. -
- Asia-Pacific I 2022
How Telcos can utilise PAM:
Preparing for the future of IoT
transformationby StefanOne of the cybersecurity categories that will be highly rele- vant in the IoT era is Privileged Access Management
(PAM), which allows security teams to manage the accounts
of users who have permission to view and change business-critical corporate resources. -
-
-
-
-
- North America I 2022
5G O-RAN is changing the decade old wireless network market mechanics. For Good
by StefanAn Open Radio Access Network (O-RAN) is a disaggregated approach to
deploying mobile fronthaul and midhaul networks built entirely on cloud
native principles. O-RAN underscores streamlined 5G RAN performance
objectives through the common attributes of efficiency, intelligence
and versatility. Open RAN deployed at the network edge will benefit 5G
applications such as autonomous vehicles and the IoT, support network
slicing use cases effectively, and enable secure and efficient over-the-air
firmware upgrades. -
Since 5G service requirements span so many industries, they are both a
business opportunity and challenge, requiring one to deploy innovative
mobile services faster than ever before. Unlike the preceding three pillars,
which all add complexity to the equation when appropriately executed,
orchestration and automation can make it all appear effortless to the enduser and the operator. -
The hype around 5G has skyrocketed expectations, and the promise of
highly reliable, always available, everywhere accessible super-fast networks
and services must be fulfilled. However, despite the rapid expansion in 5G
adoption, with increasingly more services and supporting devices being
deployed, ‘real’ 5G is yet to reach scale. According to research firm Omdia, as
of June 2021, only 14% of 5G networks have reached 10% subscriber penetration
– a key milestone that marks the tipping point where 5G appears to begin to
have a positive impact on mobile revenues. - North America I 2022
No-code BSS and monetisation of the 5G Economy: Helping service providers take centre stage in the 5G value chain
by StefanIn 2020 consumer research firm Sapio, surveyed over 5,000 gamers and the
results showed that 79% would seriously consider switching their existing
home broadband and mobile services for a 5G offer that delivered a better
gaming experience. What’s more they’d pay a premium for this improved
gaming experience. A staggering 95% said that they’d pay more for the
better gaming experience, with 60% saying they’d be happy to pay 50%
more. What’s key here is that the customers, in this case gamers, would pay a
premium for the gaming experience – not the connectivity or the games, but
the experience. With stand-alone 5G, service providers can set up specific 5G
network slices for gaming with a quality of service that delivers the gaming
experience that people want as well as enable the next stage in gaming - North America I 2022
Crafting a new topography for service assurance in the 5G Standalone era
by StefanThe evolution from 4G to 5G is driving significant investment in core
infrastructure, across both public and private networks and deployment
across a range of vertical markets. However, as of now, most carriers have
launched an early version of 5G that relies on the availability of 4G service -
So from a frequency point of view, 5G has come a long way in just a few years
with two of the five 5G flavors, including both low-band and upper mid-band
5G, fairly along the adoption curve. Sub 2 GHz activity is rising but adoption
still remains low. 6 GHz 5G has not begun yet, though this band is expected to
play a fundamental role afte - North America I 2022
Scaling 5G: New benefits emerge for enterprises and underserved areas
by Stefan5G has become a lightning rod topic as each carrier claims superiority,
but it’s also opening doors that weren’t previously accessible. Prior to the
onset of 5G deployments, the sheer amount of capital expenditure needed
for communications infrastructure rollouts in rural areas often proved
prohibitive for companies that were seeking a strong business case to make
rural broadband a real opportunity. With wireless carriers now invested in
blanketing much of the U.S. in 5G coverage, and building out towers in urban,
metro and rural areas, this more promising business case has emerged. -
As 5G networks are deployed and 4G continues to be upgraded, businesses
whose use cases fall into the categories outlined above should begin to test
5G equipment for their applications. For everyone else, 4G LTE is, as its name
suggests, a solid long-term technology which can assist with a transition to
5G if and as needed in the future – and support your application for many
years to come.
Now the reader may be asking themselves: if ubiquity may yet be years
away, why should I start work today? The answer is simple, maintaining your
competitive edge means being ready to deploy when the network is ready
for you. Anyone who has deployed cellular-enabled applications in previous
generations will have learned (maybe the hard way) that success may require
multiple rounds of testing and fine tuning along the way.