Jola Cloud Solutions' Blog

Cyber Security

Posted by Adrian Sunderland on 18-Nov-2021 12:50:54

There have been some high-profile cybersecurity attacks on IoT and M2M devices and deployments. The Bristol Airport's flight information system was hacked and held for ransom, and the digital signage in Union Street station was hacked as well, with the train information screens being used to display hardcore pornography at rush hour. These attacks were obviously highly visible and disruptive, but there are also hidden attacks where IoT devices are hacked to become part of botnets that are then used to power massive DDOS attacks against whomever the hackers are trying to target. In this scenario, the device owner may not be aware of their role until their monthly bill arrives and their connectivity consumption has increased dramatically.

Jola provides SIMs that are used in a wide variety of different IoT and M2M scenarios. We’re acutely aware of the need to protect our resellers and their customers from the consequences of falling victim to a cybersecurity attack. At the foundation of what we do is our Mobile Manager portal, which, with its real-time alerts and control, provides visibility into the SIM usage before the monthly bill arrives. However, our approach goes beyond just managing costs. If the application does not need access to the Internet, then why would you expose it online? Jola offers SIMs that provide secure private access back to a corporate network with no access to the Internet at all. This almost eliminates the ‘attack surface’ completely. Jola has also been involved in some extremely high-profile digital signage deployments where our approach to security has gone beyond just securing connectivity. We have provided secure devices with hardened device operating systems and configurations to deliver a truly secure solution.

Our goal is to enable our channel partners to embrace opportunities and benefit from our experience to deliver unique and differentiated solutions to their customers that are secure from threats that are undeniably out there.

Read More

Topics: Cyber Security

Learn about the latest business communication technologies.

Find out what is available in your area.

This blog contains articles, reviews and interviews about the latest communications technologies for business.Sign up to this blog:

  • Become an expert in business cloud communications
  • Learn about the latest technologies
  • Understand how they can benefit your business


Subscribe to Email Updates

Recent Posts