Connect with us

Opinion/White Papers

The Vital Role of Managed Services to Deliver Secure Networks

Published

on

, SiliconNigeria

By Mohamed Elsokkary

The exciting evolution of connectivity will undoubtedly touch every aspect of society and change it for the better. With the deployment of 5G and the demand for reliable, secure, and robust connectivity, mobile network operators need to address the intensifying complexity of their networks that is driven by the increasing volume of devices, multiple new technologies, and more diverse service requirements.

From the nuisance of a funny clip on social media applications annoyingly freezing, to critical communications where a glitch could be serious if it affects remote surgery or an automated factory, secure user experience is now the main end-user expectation as 5G use cases become more demanding, critical and sophisticated.

After 5G networks are planned, designed, built, optimized and then transferred to operations, the focus shifts to supporting the overall quality and security experience of end-users which necessitates a fundamental shift from the way deployed networks are managed and optimized today. This shift from the traditional network resource management model – where technology-related capacity, performance and availability are key – to successfully operating high-performance service-driven networks in a secure manner means that the operations and optimization of 5G networks must transform from being technology to end-user service centric.

There are critical measures which are adopted by Managed Services Providers (MSPs) to protect data and ensure the ongoing confidentiality, integrity, and availability of Services. These ‘Technical and Organizational Measures for Security’ include, but are not limited to the following:

  1. Business Continuity Management: MSPs should design and implement the process and tools with the right expertise to ensure the continuity of information security management in adverse situations, such as during a crisis or disaster.
  2. Information Protection & Information Assets Handling: MSPs should ensure the protection of Communication Service Providers (CSPs) data against unauthorized access, and to maintain the policies on the use of cryptographic controls, and the protection and lifetime of cryptographic keys in accordance with industry best practice. In addition, Regular performance of security assessments on Information systems is advised to detect any vulnerabilities.
  3. Identity & Access Management: MSPs are tasked to maintain controlled processes and systems covering the formal registration of users with a unique identity as prerequisite for granting any access to the user.
  4. Software Development: One of important tasks of MSPs is to ensure that the development, testing, and operational environments are separated to reduce the risks of unauthorized access or changes to the operational environment.
  5. Network Security: Operating procedures for the management of network security should be maintained by MSPs, including intrusion detection and prevention, firewall protection, denial of service attack and prevention, and web filtering. In addition, protection of secure areas with appropriate entry controls designed to ensure that only authorized personnel are allowed access and physical access to areas where any data is stored is restricted to Authorized Users.

The trustworthiness not only originates from a set of security features, but also from system design principles and implementation considerations that have all been applied with a holistic and risk-based mindset.

As such, Ericsson Managed Services has addressed such challenges and strengthened their security agenda to meet the industry standard requirements using AI and ML algorithms. Ericsson Operations Engine utilizes AI and data-driven solutions to power intelligent, predictive mobile networks. This allows for detection, monitoring and managing threats using real-time risk visibility and automated resolutions – delivering robust security from device to cloud.

With such enhanced data driven operation capabilities and end-to-end improvements based upon predictive forecasting of network performance, MSPs can bring economies, and deliver better operations thus giving CSPs the opportunity to deliver enhanced services to their customers and increasing business opportunities.

Getting the right Managed Services partner will fulfill any CSP’s high mandates on security, ensure confidentiality, integrity, and availability of assets, protecting the brand image, and minimizing any business disruption.

Continue Reading
Advertisement Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Opinion/White Papers

Balancing Growth with Affordability In Nigeria’s Telecom Industry

Published

on

, SiliconNigeria

By Elvis Eromosele

Today, Nigeria’s telecommunication industry stands at a crossroads. It is facing pressure on a thousand different fronts. On the inside, it is battling with the challenges of sustainable operations and shareholders demands and on the outside, raising costs and regulatory constraints. 

The Nigerian telecom industry has immense potential. The recently launched GSMA digital economy report made this point. It projects a rise of 15 million new internet users by 2028. It equally highlights the industry’s significant contribution to the nation’s GDP. 

Industry players, in the light of existing reality, have determined that a tariff increase will provide some succour and allow it to breathe. The Association of Licensed Telecom Operators of Nigeria (ALTON), an umbrella organisation for telecom and allied services providers, is at the forefront of the push for tariff increase.

ALTON argues that current tariffs, unchanged for over a decade, are insufficient to maintain operations and may indeed hinder vital investments in network infrastructure and possibly impact service quality. This assertion gains traction against a backdrop of foreign exchange losses, declining profits, and the increasingly challenging economic environment 

Within the same decade, electricity tariff was raised, at least, three times; the price of fuel has gone up by over 300 per cent and inflation has effectively climbed to over 33 per cent. Yet, operators’ demand for telecom tariff increases has sparked a contentious debate among industry stakeholders. For many, the crux of the matter is that the economy is already hard, so telcos should not compound things by increasing tariffs at this time. Economists will take a dim view of this argument. 

The telcos’ reason for pushing for tariff increases hinges on three main points. One, rising costs. Inflation, currency devaluation, increase in the pump price of fuel, electricity tariff increases and a general economic downturn have significantly increased operational expenses. The cost of maintaining and upgrading infrastructure, alongside acquiring foreign equipment, has outpaced current price structures.

The second is the investment challenges. Without a price adjustment reflecting economic realities, investors become hesitant. This stagnation in investment will limit the industry’s ability to expand networks, adopt new technologies like 5/6G and ultimately serve a growing population. The bulk of investment in the sector is dollar-denominated. 

Then thirdly, unsustainable business environment. The industry contends with a multitude of charges and levies (the perennial multiple taxation). ALTON reveals that there are over 45. This burden, coupled with a perceived lack of regulatory independence, creates an unfavourable business climate.

The government, however, has firmly rejected the proposal for a tariff hike. The NCC has refused to approve it. Bosun Tijani, Minister of Communications, Innovation and Digital Economy, emphasizes the need for a comprehensive solution. He argues that higher prices would disproportionately affect affordability and hinder inclusion, particularly for low-income Nigerians. This outcome will no doubt widen the digital disparity in the country.

In my mind, to move forward, we must be able to strike a balance between the financial viability of telecom companies and ensuring service affordability for consumers. This path likely involves a multi-pronged approach. 

We can start by reviewing the levy landscape. 45 is definitely too many. Reducing the number of charges levied on telecom operators could free up resources for investment. This can potentially create a more attractive business environment.

Secondly, regulation must be streamlined in line with global best practices. Experts concede that enhancing regulatory clarity and promoting an environment that encourages responsible risk-taking by investors would be crucial.

Moreover, operators have the option of exploring alternative revenue streams. This means that telecom companies can explore value-added services or targeted data packages to generate additional revenue without burdening core services.

The government is not left out. It must consider incentives. The federal government should as a matter of urgency consider targeted incentives that encourage network expansion and technological advancements. This will encourage operators to seek growth without solely relying on price hikes. The NCC must step up to the plate here.

At the heart of the debate lies the delicate balance between consumer affordability and industry sustainability. While tariff increases may alleviate financial strains for telecom operators, they also raise concerns about affordability and access for consumers, particularly in a country where digital inclusion remains a priority. 

To ensure that the telecom sector achieves its potential, we can’t play the ostrich anymore. Constructive dialogue and collaboration between government, industry stakeholders, and regulatory bodies are indispensable at this point. Adjustments must be made, if the sector is to maintain its contribution to Nigeria’s GDP, currently eight per cent, and thus continue to boost the broader ICT ecosystem growth.

By implementing cost-reflective tariffs, telecom companies can enhance their financial viability, enabling them to make essential investments in infrastructure, technology, and service quality. 

Eromosele, a corporate communication professional, writes via: [email protected]

Continue Reading

Opinion/White Papers

How Digital Marketing is Embracing the Ever-changing World of Work 

Published

on

, SiliconNigeria

By Gaston Taratuta, Founder and CEO of Aleph Group, Inc

The world of work has always changed and evolved in line with technological advances and major consumer shifts. Did you know, for example, that in Victorian Britain people were paid to wake factory workers up by tapping on their windows? Called knocker-uppers, they were a common sight until alarm clocks rendered them obsolete.. 

In recent months you may have seen articles predicting that, thanks to the rise of artificial intelligence (AI) tools such as ChatGPT, prompt engineering will become an important and necessary career skill in the near future. Some experts even suggest that the field, which boils down to giving AI tools the best possible inputs, is so critical that it may even become a career path in itself.   

But that’s just one example of where the world of work is headed. If you really want to future-proof yourself, it’s worth having a much broader view. And on that front, you could do a lot worse than keeping a close eye on the digital marketing sector. 

An industry unafraid of change 

Digital marketing has a long history of adapting and embracing big technological and societal shifts. From the early days of website banner ads through to innovative products on social media and streaming platforms, each advancement has required people in the sector to build up new skills to ensure that they’re providing the best possible service to their clients. 

That’s unlikely to change in the near future either. According to LinkedIn, the “Digital Marketing Specialist” role is among the top 10 most in-demand jobs, with 860 000 job openings. The fact that the most requested experience in digital marketing includes social media, content strategy, SEO, analytics, also shows how broad the field has become. 

Even those specific areas of experience are changing all the time. Take online communities, for example, before 2016, when the likes of Facebook and Twitter were well established, no one had any expertise in marketing on TikTok. Today, the platform has more than a billion users and is an increasingly important part of any organisation’s digital marketing strategy. As a result, people in digital marketing have had to build up the skills necessary to market on the platform. 

The same is true for every new product a social media platform launches. Twitter, Snapchat, Instagram, and Spotify, are all unique in its form. It’s also worth remembering that a user’s experience on TikTok has nothing to do with their experience on Twitter. You seldom meet someone who understands all the platforms very well. Additionally, there are changes all the time, so to be successful in digital marketing you have to be able to learn new things and be flexible all the time. 

These are also the qualities that you need to succeed in the rapidly changing world of work. 

Acquiring the right skills 

So, how should you go about acquiring the skills necessary to thrive in the world of digital marketing and beyond? 

There is no doubt that formal certification can be incredibly helpful, especially when you’re starting out on your journey. It’s part of why we launched our free Digital Ad Expert community. The 12 week course covers the basics of strategy and analytics, as well as platform specific advertising methodologies for all the major social media platforms. 

Once you have those basics in place though, self-exploration becomes critical. You have to be curious. You have to want to learn. You have to commit. By certifying yourself on all the platforms you can (this can usually be done for free). Learn things like Google Adwords, how to do marketing on Instagram, and as many other products as you can. 

Getting to that point won’t take long, for some people it can take as little as six months. From there, practice and keep practising. If you don’t have a client to practise on, market yourself. Soon enough you’ll learn that, in such a fast-changing world, years of experience matter less than your ability to deliver results. 

Powered by the present, ready for the future 

It’s something that’s been true of digital marketing for a while now. It’s also something that’s becoming increasingly true of the world of work in general. So, if you want to be ready to face the future, look to an industry that already has a strong track record of adapting to epoch-shifting changes. 

Continue Reading

Opinion/White Papers

Bridging the Gaps to Safeguard the Future of Hybrid Work

Published

on

, SiliconNigeria

By Emmanuel Asika, Country Head, HP Nigeria  

The emergence of cultures within adaptable working models that facilitate improved flexibility and therefore well-being whilst generating new range of opportunities to innovate and increase productivity shows that hybrid work is here to stay. A report by
Gartner shows a sizeable 51% of US knowledge workers are projected to work ‘hybrid’ and 20% to work fully remotely in 2023. Just as a Phillips Consulting (PCL) study reveals how Nigerian executives considered culture as one of the top factors to consider in their business strategy, moving from a 17% focus pre-COVID to a 44% focus in some cases to align with the future of work.  

Notably, these new dynamics signal new trajectories for security teams, as business protection is now more demanding because the path has become doubtful. To mitigate this, emphasis must be on protecting endpoints – PCs and printers; the ‘focal point’ of most attacks. Thus, to detect, prevent, and control cyber threats, new cybersecurity strategies are required; to dispel the threats associated with lost or stolen devices by boosting remote PC management.  

Mitigating security slips  

It’s clear that 82% of security experts adopting a hybrid work model have slip-ups in their organization’s security architecture, a new research and a hybrid security report from HP Wolf Security reveals. The epicenter of the hybrid worker’s world is the endpoint.  

In fact, 84% of security experts agree that endpoint is where the most enterprise-damaging cyber-threats occur, and it’s the root of most security threats – be it a PC, smartphone, laptop, tablet, or complementary peripherals like printers. For malicious attackers, these devices can be a target entry point.  

Nonetheless, local networks may be compromised and misconfigured. But truly, endpoints are the link bridging unprotected technologies and imperfect users. When devices are not provided with requisite routine enterprise protection, hybrid work models suffer and negatively affect productivity. Significantly, machines and employees working remotely are likely to be without appreciable protection and left vulnerable.  

Furthermore, some employees who are confined to their comfort zone without assistance of knowledgeable coworkers makes them more prone to either opening an attachment containing malware or clicking on a risky link. Employees likewise work in cafes, restaurants, and airports, and perhaps even living the digital nomad lifestyle abroad; they aren’t just working from home (WFH). Actually, two-thirds (66%i) of security leaders and IT experts consequently concluded that the most pronounced cybersecurity weakness in their organization is the possibility for hybrid employees to be compromised – phishing, ransomware, and attacks via unsafe home networks are also cited as top enterprise risks.  

Forward-thinking organizations now seem focused on fine investment in securing hybrid work, with a commendable four-fifths i.e., 82% of security leaders increasing budgets threshold specifically for hybrid workers, and 71%of these leaders expect this focus to increase further in 2023. Yet, the impact of their budget must be targeted at the appropriate tools with a concentration on positioning the endpoint front and center of any hybrid security strategy.  


Leaving no stone unturned  

An improved remote management of devices, despite its attendant complexities, is most necessary as most major considerations for the IT and security teams, in this hybrid age. Also, 70%i of security experts conclude that the risk of lost or stolen devices is prevalent in hybrid work. This triggers the question – when remote machines are powered down or offline, what happens? Locating or safeguarding data on these devices could be tasking, and substantially risky if they either contain confidential trade secrets, personally identifiable information (PII), or intellectual property (IP). The reality here is that Cloud Technologies have helped to reduce the workload here, but they’re not 100% effective.  

Human-error risk tendency is rife with itinerant workers always on the move; same way there will always be unethical hackers lurking around for susceptible devices they can attack. This trend raises risks, exclusively in highly regulated sectors like government – where a lost or stolen laptop could mean a
national security risk.  

Connecting with a fresh approach  

In Nigeria, an emerging economy, institutions are gradually deepening hybrid work models via infrastructure investments despite challenges of electricity, network coverage, low bandwidth, and affordability. HP has also been working on designing a model of
IT management connectivity solution hence, the new HP Wolf Connect service now enables IT to manage devices even when powered down or offline.  

So, for IT managers, what can they do to mitigate these concerns? Step one is to find a fresh approach to link remote computers over cellular networks. This implies that devices can be controlled even when turned off or offline. Fundamentally, such functionality could be deployed to connect with lost or stolen devices and then lock and wipe them. This approach will not only lower the risk of data leaks and violations, but it can also moderate IT expenses by cutting cases of PC replacement or remediation. A stronger and secure connection to remote computers also reduces the time and effort required to resolve support tickets. Teams can precisely report where and when devices went missing, and how long it took to lock or erase them. Now, that’s a fresh approach to security.  

About 80% of institutions laid claims to have deployed numerous tools and policies to protect hybrid working staff. However, what’s vital now is that these tools and policies require a paradigm shift from old perimeter-focused thinking. Once again, endpoint must become the focus for applying protection in the hybrid age. Accepting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be strategic for protecting end-users without impacting on the freedoms that hybrid work admits.  

This model should be part of an approach to hybrid workplace security that takes into consideration the distinct threats and contextual challenges that are more common with flexible working.  

Incidentally, about two-thirds, representing 61% of corporations and leaders, are saying that protection of their hybrid workforce will be harder moving forward. This doesn’t necessarily have to be the case. Enhanced remote management and the adoption of hardware-enforced security, can help businesses unleash end-user productivity without alluring extra cyber risks.  

Consequently, businesses should upgrade to a hybrid work model, at a time when sustainable growth is strategically significant to all organizations, bearing a fine blend of tech tools and motivated people to optimize lasting productivity. This is the future of work.

Continue Reading

Popular News