NOTE! This site uses cookies and similar technologies.

Please, Accept to improve your experience of this site. Learn more

I Accept

A Telecoms Blog

When Telco Solutions Are Called For
  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
Subscribe to this list via RSS Blog posts tagged in Vulnerabilities

During these unprecedented times, from the entire BlueTC Team, we would like to THANK YOU for staying in touch with us throughout 2020!

Early in the year, when news surfaced about a virus, - which quickly evolved into a full blown pandemic -, our way of working and interacting needed rethinking. As a forewarning of what was to come, the GSMA’s Mobile World Congress was the first large, international trade show in our industry to be cancelled. From then on virtual events and meetings became the norm globally.

In this globalised and digitised era where practically anything can connect to a network, no company is completely safeguarded against attacks. The “always connected” way of life where the limits between our private and professional lives are blurred, only adds complexity to the situation. Also, our daily business activity is based on technologies like mobility, IoT, cloud, virtualisation, artificial intelligence, etc., which forces us to make a bigger effort to protect assets, including customer and vendor data, oftentimes in an unknown and complex environment.

Monthly Archive