Evaluation of Cybersecurity in Remote Working Settings for Mobile Network Operators
DOI:
https://doi.org/10.52339/tjet.v43i1.1022Keywords:
Cyber Security, Mobile Network Operators, Remote Working, Two-factor Authentication, Virtual Private Networks, Staff Training, TanzaniaAbstract
Cybersecurity has increasingly been a primary concern to people as technology advances and allows them to work remotely. This study thus evaluated the cybersecurity posture for organisations that have opted for remote working culture, whereas emerging cyber threats, practices to combat them, and appropriate guidelines for managing cyber threats were discussed. The study used a descriptive design with a quantitative approach from 118 information technology personnel working for Tanzania's three major mobile network operators (MNOs). SPSS analysed the collected data. The study revealed that predominant cyber-threats affecting MNOs in remote working include human errors, phishing attacks, malicious domains, denial of service, and ransomware. At the same time, highly applied cybersecurity controls are virtual private networks, antivirus, staff training, and two-factor authentication. The study recommends that MNOs constantly be alerted to every cyber threat; they should provide advanced cyber training and follow cybersecurity guidelines for remote working settings.
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Tanzania Journal of Engineering and Technology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.