Intelligent CIO Middle East Issue 56 | Page 14

NEWS Oman Logistics Centre launches Tawseel Service Oman Logistics Centre has launched a national cloud-based technology initiative called Tawseel. Oman saw 15,000 cyberattacks on smartphones in 2020 This will enable logistics providers to adopt the latest state-of-the art logistics solutions. Tawseel is designed to empower start-ups and SMEs in the last mile delivery space across the whole of the Sultanate in a bid to operate more efficiently and lower their capital expenditure costs by outsourcing back-end Information Technology systems to cloud service providers. E-commerce delivery start-ups and SMEs can now leverage the advanced delivery technologies provided by Tawseel, while preserving data security and privacy by hosting the solutions locally in the Sultanate. The initiative is supported by Oman Logistics Centre (ASYAD), Oman’s flagship logistics group, which has partnered with cloud service providers such as Oman Data Park, NXS and Data 2 Cloud – offering the latest last mile delivery solutions from the likes of Mile Solutions, Kale Logistics and Tookan- Jungleworks. Tawseel offers prospective subscribers several packages tailored to the size and scale of any company’s logistics operations and these are available with a one-month free trial. Kaspersky researchers have revealed malicious attacks on mobile users reached 15,000 in Oman between January to June 2020. The results of their research of cyberattacks on mobile users showed that quarantine did not have a particular influence on the threat landscape in Oman. To compare Oman with other Middle Eastern countries, the figure for Egypt was 220,000, Saudi Arabia 160,000, Kuwait 20,000 and UAE 68,000. As mobile platforms’ influence grows, the role of smartphones in business processes and day-to-day life is growing rapidly. In response, cybercriminals are paying more attention to how they are distributing malware and the attack vectors used, increasing their activity in times of crisis. In many scenarios, timing can be a key part of the success of a malicious campaign, taking advantage of those users who are changing their security practices under pressure and do not have any reliable security solutions installed on their phones. Throughout the year, the number of attacks did not change dramatically, which means that the implementation of quarantine measures did not influence the mobile threat landscape in the region. It would account for approximately 11,000 to 14,000 attacks monthly. This can be explained by the fact that mobile platforms were initially made to be independent from the physical location of the user. 14 INTELLIGENTCIO www.intelligentcio.com