Pakistan Telecommunication Authority (PTA) has successfully blocked 183 illegal mobile Apps and 2369 prohibited websites. In an effort to counterbalance illicit mobile applications, websites, and online content, Pakistan Telecommunication Authority (PTA) has successfully modified and restarted its Web Management System (WMS).
PTA’s arsenal has shown the enhanced WMS to be a great tool. Official documents of PTA revealed that the system has successfully blocked a large number of websites that are hosting illegal content and are in violation of Pakistan’s digital legislation since it was reactivated.
PTA’s increased oversight capabilities allow it to monitor online content within its technical restrictions.
Apart from the updated WMS, PTA has also started a thorough cybersecurity investigation for telecom companies. Furthermore, the aim of this audit is to strengthen the overall cybersecurity defenses of telecom industry in order to protect Pakistan’s digital infrastructure from online attacks.
Sources claim that PTA has ordered renowned businesses to carry out these audits, with the urgency on a thorough examination of all technological cybersecurity-related issues. PTA will conduct the last assessment to make sure all cybersecurity precautions comply to international norms.
Several critical areas will be the focus of the cybersecurity audit.
- The audit will evaluate whether telecom companies have successfully carried out the recommended cybersecurity framework into practice. The firewall’s installation status will also be examined.
- The audit will also make sure to check the backgrounds of the working staff members for telecom operators and that only those who have been subjected to evaluation are conducting the classified information.
- Telecom companies will be closely investigated for the procedures they have put in place to keep customer data private and making sure it is secure, including sensitive and personal data.
PTA has made it clear that the purpose of this annual audit is to guarantee the cyber protection of telecom service customers as well as the security and adaptability of the telecom environment and infrastructure.