ZIMBABWE largest landline telephone pioneer TelOne is serving to enhance cyber security whilst monitoring all gateways at every border, Minister of State for Harare
Metropolitan Provincial Affairs and Devolution, Senator Oliver Chidau has said.
Speaking during a tour of the TelOne Call Centre, Data Centre and National Operations
Centre in Harare on Friday, Minister Chidau said,
“As we strive for a digital economy, Government, businesses and more people go online
thus increasing the need for data centres. The tour of the National Operations Centre was
also quite informative as we are advised that the Centre serves to enhance cyber security
as it monitors all gateways at all borders.”
Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.Data Confidentiality. One of the biggest roles of IT security is protecting sensitive information, especially concerning the data that needs to be kept confidential.
Data Integrity, Data Authenticity and Data Availability are a must in the protection of our borders.
Speaking at the same occasion the Provincial Development Coordinator for Harare Metropolitan Province, Tafadzwa Muguti emphasised on the need to secure our own cyber by owning our own domains and data.
Mr Muguti an IT Computer specialist himself said.
”We can’t be a smart nation if we can’t host an email in our own country.”
He added ”we should be having our own,
www .Chitungwiza. com instead of Gmail’s and yahoos”
Muguti hit the right codes as Cloud Security, Cloud-based data storage has become a popular option over the last decade due to its enhanced privacy.Network Security and guarding your internal network against outside threats with increased network security is exactly what TelOne staff are doing.
Application Security also helps ensure this Cyber security which is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.