Explore the world with Alertify. Get roaming news, tips, and the tech to travel without limits.

Follow Us

Checkingresistancetocybercriminalattacksisthefirststeptoimprovingthesecurityofanybusiness.ThenewT Mobileservice,VulnerabilityTesting,extendedwithSecurityAwarenesstraining,allowsyoutoinstantlyidentifythoseareasinthecompanywhereitisnecessarytointensifyworkandincreaseprotectionagainstcybercriminals.TheconclusionsofthestudywillalsoalloworganizationstoavoidthreatsthataffecttheoperationoftheenterpriseanditsICTsecurity.

T-Mobile Poland introduces new business cybersecurity services

T-Mobile Poland has introduced a new service for its corporate customers, helping companies check if their infrastructure is resistant against cyber-threats. The service also includes Security Awareness training. tmobile poland cybersecurity

SIM card e SIM shop

Checking resistance to cybercriminal attacks is the first step to improving the security of any business. The new T-Mobile service, Vulnerability Testing, extended with Security Awareness training, allows you to instantly identify those areas in the company where it is necessary to intensify work and increase protection against cybercriminals. The conclusions of the study will also allow organizations to avoid threats that affect the operation of the enterprise and its ICT security.

The five key areas of cybersecurity of the company tmobile poland cybersecurity

The service is directed primarily to those companies that do not need an expensive and extensive audit. However, they would like to test their vulnerability in key areas or need preliminary information to further develop resistance analysis. The customer may order the entire package or may choose to investigate only one or a few selected areas. It is also worth mentioning that the entire process, from the first interview, through research and analysis of a specific area, to the final report, takes about a week and after that time it is possible to draw conclusions and possibly start work on strengthening the company’s security.

Therefore, a comprehensive sensitivity study will verify the company’s resilience to threats resulting from undesirable and unexpected events, posing a significant probability of disrupting business activities and threatening ICT security. As a result, it will allow to increase the level of security, streamline incident management processes and facilitate adaptation to existing and planned regulations – including the act on the national cybersecurity system, the act and telecommunications law or, for example, the KNF-D recommendation regarding IT security management in banks.

The Sensitivity Testing service includes analyzes of the following areas:

  1. Assessment of the condition of the ICT infrastructure – as part of the study, all components are assessed, including those leased, shared, virtualized or made available outside. T-Mobile will inventory and check the network infrastructure resources, the vulnerability of the network software used, security gaps and configuration errors, indicate potential actions against identified threats and assess the risk status of an attack on the company’s infrastructure.
  2. WEB security and security research – within this area, the analysis will cover the processes transferred to the Internet, along with the verification of vulnerabilities, assessment of the effectiveness of the web firewall or dynamic analysis of the source code of the web applications used. The research will also help identify potentially malicious software and content embedded in applications.
  3. Analysis of supervision over the point of contact with the Internet – T ‑ Mobile will check the architecture of solutions, help detect high-risk applications and content, and analyze threats at the level of functional modules. The study will also show the company’s sensitivity in detecting and blocking certain types of traffic, for example new network exploits, DDoS attacks, etc. The study detects high-risk applications and content.
  4. Verification of the method of protecting e-mail systems – in this area, the analysis will primarily cover the mechanisms of e-mail protection, also by generating specially prepared messages containing potentially harmful content. It will also check how the company or employees react to attacks with attachments containing a URL pointing to a malicious website.
  5. Assessment of the State of Safety Culture – the last, but one of the most important elements of the Sensitivity Test. As part of the safety culture survey, T ‑ Mobile will check the level of sensitivity of the organization’s employees themselves. Thanks to the simulation of real phishing campaigns, the use of personalized messages and simulated, non-invasive attacks on specific groups, it will also be possible to assess threats in individual departments and identify, for example, training needs among specific employees.

According to ENISA reports, the weakest point of any security system is most often the human being, and most attacks are directed at employees. As many as 84% ​​of cyber attacks detected in 2019-2020 were based on social engineering, and 71% of organizations felt the effects of malware that spread around the company through communication channels such as e-mail, internal channels or messaging. Therefore, the Security Awareness program complements the Vulnerability Testing. Employees of a given company will receive simple, interactive content that will make them aware of the risks. In turn, their knowledge will be checked by periodic, simulated attacks, improving vigilance and awareness of cyber threats that may threaten the organization.

In addition to the Sensitivity Test, T-Mobile business customers can take advantage of a wide range of professional and comprehensive data processing and security services, which include: colocation, advanced server and public cloud hosting offer, private and hybrid cloud products and Disaster Recovery as a Service, which enables emergency reconstruction of the client’s IT environment on the T-Mobile infrastructure. The portfolio of cybersecurity services includes: MDM, Cyber ​​Guard, Cloud Security, VPN as a Service, AntyDDoS, managed Firewall or WAF and Security Operations Center. All such solutions strengthen the company’s security, which translates into the possibility of a stable business. tmobile poland cybersecurity


Like this? "Sharing is caring!"