Communications And Technology

To securely realise the benefits of emerging technology such as the internet of things, wearable tech, smart metering, and ever more prevalent mobile access, requires a thorough understanding of security vulnerabilities as they emerge and the ability to respond to these in a timely fashion.

Organisations also need to consider the demands from emerging legislation such as the EU data protection requirements or requirements for communications providers to store customer for longer to support government investigations.

As part of PA Consulting Group, we are also able to combine our technical cyber security expertise with deep industry knowledge and skills in management consulting, technology and innovation. To find out more about what PA has to offer in the Communications and Technology sector, click here.

Related Insight

  • Have_you_been_hacked_20161017

    The rise of ethical hacking

    7Safe’s Aleksander Gorkowienko, a penetration testing expert, is quoted in an article in Mobile Europe about the rise of ethical hacking. The article discusses whether ethical hacking by telecoms firms is the answer to testing and securing internet of things devices.
    Read more
  • information_security

    Why you should care about an old hashing algorithm

    It has been some years now since the US National Institute for Standards and Technology announced that the SHA-1 encryption algorithm should no longer be regarded as secure and required US federal agencies to move away from its use, so why does this now matter to senior business officers?
    Read more
  • Depositphotos_53301819_s

    Norway’s reveals the use of “IMSI catchers” set up to gather sensitive information

    Our head of penetration testing, Aleksander Gorkowienko, along with Norway-based colleague Øyvind Stensby has had an article published online by that looks at the use of IMSI catchers set up to provide unknown third-party sensitive information. This follows on from an article by Aftenposten, Norway's largest newspaper, about the discovery that members of the [...]
    Read more

Related Case Studies

  • shutterstock_136601936

    Bringing security controls up to scratch on a leading document management solution

    For a secure document management solution to be credible, security controls need to be watertight. ...
  • shutterstock_225807817

    Establishing a clear picture of security loopholes in our client’s IT infrastructure

    Our client asked us to perform a time-limited internal and external host discovery exercise on ...
  • CaseStudy_Telecomunications_SML

    Meeting customers’ expectations of the highest levels of cyber security from a market leader

    Security breaches in the telecoms sector have made headline news in recent years so our ...