Experts in information technology and cybersecurity have called on Jordanian companies to develop national products, tools, and solutions to face global technological risks. They told the Jordan News Agency (Petra) that it is important to have redundancy and backup systems for disaster recovery and service continuity, which should be activated in case of a primary system failure.
They emphasized the need for companies to continuously monitor the situation, keep employees informed about any issues and specified solutions, and implement internal procedures to handle such problems.
Nidal Bitar, CEO of the Information and Communications Technology Association of Jordan (int@j), highlighted the necessity for Jordanian companies to national products and solutions to address global technological risks, stressing the importance of digital sovereignty in the current era.
Bitar explained that digital sovereignty refers to a country's ability to control its destiny in the digital world, including the data, devices, and software it uses and develops. He pointed out that the concentration of control in a few global locations reduces the diversity of technology market options and gives excessive power to a few major tech companies.
Bitar called for a unified Arab strategy that considers the region's unique challenges to achieve digital sovereignty. Regarding the recent global technical glitch affecting several sensitive sites worldwide, such as banks and airports, Bitar underscored the importance of diversifying cybersecurity solutions and developing national ones, emphasizing that reliance on various systems and technologies reduces the likelihood of being affected by a single system failure.
He also highlighted the need for crisis preparedness through contingency and business continuity plans to handle potential technical outages, commending the efforts of the National Cybersecurity Center and other relevant bodies.
Bitar stressed the importance of investing in training and awareness to enhance security awareness among employees, continuous monitoring, and regular system updates to address new security vulnerabilities.
Regarding how Jordan can avoid similar damage in the future, Bitar pointed to the necessity of diversifying security technologies and not relying on a single security system, enhancing cybersecurity infrastructure by investing in technological infrastructure development and improvement.
He affirmed the importance of regular system testing to detect and address weaknesses before they are exploited by attackers, collaborating with international experts to benefit from the expertise of global institutions and companies in cybersecurity, and regularly updating systems to ensure they include the latest security updates.
Bitar called for developing local competencies and supporting education and training programs to develop the skills and expertise of cybersecurity professionals within the Kingdom to ensure sustainable protection.
Dr. Ahmed Al-Atoom, Head of the Cybersecurity and Cloud Computing Department at the Applied Science Private University, said that despite 'CrowdStrike' being one of the world's leading companies in information systems protection, its installation of an caused an unexpected glitch in some cloud security services and some Microsoft services, leading to varying outages globally.
Al-Atoom emphasized the importance of redundancy and backup systems for disaster recovery and service continuity, which should be activated in case of a primary system failure. He stressed that comprehensive testing and carefully managed updates should be conducted before implementing them in a live environment to prevent unexpected issues.
Al-Atoom stated that if the updates had been fully tested in a trial environment, they would not have caused such problems in live systems. He also emphasized the necessity of emergency plans and crisis management, encouraging companies to develop and review contingency plans and crisis management procedures to handle technical failures quickly and efficiently. Continuous network monitoring and data analysis can help identify potential issues before they become significant outages.
Regarding how Jordan can avoid such damage in the future, Al-Atoom noted that although the incident did not have widespread effects in Jordan due to limited reliance on CrowdStrike's services, it calls for vital sectors in Jordan to be cautious about relying on cloud infrastructure.
He suggested investing in a robust and distributed cloud infrastructure to reduce the risk of technical failures and building local data centers and recovery centers in geographically dispersed locations nationally and even internationally to ensure service continuity from alternative sites in case of primary site failures due to technical reasons or cyberattacks.
Al-Atoom highlighted the need to develop local capabilities and train personnel on the latest techniques and best practices in cloud system management, leveraging cloud services, and protecting systems from cyber threats. He also stressed the importance of collaborating with global technology companies to adopt the latest solutions and tools in cloud computing and cybersecurity and understanding their disaster management procedures, ensuring binding contracts hold these companies accountable for material and moral damages caused by service disruptions.
He suggested reviewing cloud computing-related legislation and policies and imposing more regulations on service providers, especially those handling critical services for citizens.
Strategic Technology Consultant Engineer Hani Al-Batsh proposed some solutions for the recent global technical glitch, advising users to follow certain steps such as checking for known service outages, troubleshooting by restarting the application or device or clearing the application's cache, reporting issues through official channels, and using offline alternatives.
Al-Batsh emphasized the importance of companies actively monitoring the situation, keeping employees informed about any issues and specified solutions, implementing internal procedures to handle such problems, including backup plans and communication protocols, and considering alternative cloud solutions or business continuity plans to minimize future disruptions.
From a technical perspective, Al-Batsh stressed the need to establish service recovery and continuity plans by using multiple methods, such as fiber lines from multiple service providers, satellite connections for essential entities, cloud hosting services, and having a local cloud or another provider.
Experts in information technology and cybersecurity have called on Jordanian companies to develop national products, tools, and solutions to face global technological risks. They told the Jordan News Agency (Petra) that it is important to have redundancy and backup systems for disaster recovery and service continuity, which should be activated in case of a primary system failure.
They emphasized the need for companies to continuously monitor the situation, keep employees informed about any issues and specified solutions, and implement internal procedures to handle such problems.
Nidal Bitar, CEO of the Information and Communications Technology Association of Jordan (int@j), highlighted the necessity for Jordanian companies to national products and solutions to address global technological risks, stressing the importance of digital sovereignty in the current era.
Bitar explained that digital sovereignty refers to a country's ability to control its destiny in the digital world, including the data, devices, and software it uses and develops. He pointed out that the concentration of control in a few global locations reduces the diversity of technology market options and gives excessive power to a few major tech companies.
Bitar called for a unified Arab strategy that considers the region's unique challenges to achieve digital sovereignty. Regarding the recent global technical glitch affecting several sensitive sites worldwide, such as banks and airports, Bitar underscored the importance of diversifying cybersecurity solutions and developing national ones, emphasizing that reliance on various systems and technologies reduces the likelihood of being affected by a single system failure.
He also highlighted the need for crisis preparedness through contingency and business continuity plans to handle potential technical outages, commending the efforts of the National Cybersecurity Center and other relevant bodies.
Bitar stressed the importance of investing in training and awareness to enhance security awareness among employees, continuous monitoring, and regular system updates to address new security vulnerabilities.
Regarding how Jordan can avoid similar damage in the future, Bitar pointed to the necessity of diversifying security technologies and not relying on a single security system, enhancing cybersecurity infrastructure by investing in technological infrastructure development and improvement.
He affirmed the importance of regular system testing to detect and address weaknesses before they are exploited by attackers, collaborating with international experts to benefit from the expertise of global institutions and companies in cybersecurity, and regularly updating systems to ensure they include the latest security updates.
Bitar called for developing local competencies and supporting education and training programs to develop the skills and expertise of cybersecurity professionals within the Kingdom to ensure sustainable protection.
Dr. Ahmed Al-Atoom, Head of the Cybersecurity and Cloud Computing Department at the Applied Science Private University, said that despite 'CrowdStrike' being one of the world's leading companies in information systems protection, its installation of an caused an unexpected glitch in some cloud security services and some Microsoft services, leading to varying outages globally.
Al-Atoom emphasized the importance of redundancy and backup systems for disaster recovery and service continuity, which should be activated in case of a primary system failure. He stressed that comprehensive testing and carefully managed updates should be conducted before implementing them in a live environment to prevent unexpected issues.
Al-Atoom stated that if the updates had been fully tested in a trial environment, they would not have caused such problems in live systems. He also emphasized the necessity of emergency plans and crisis management, encouraging companies to develop and review contingency plans and crisis management procedures to handle technical failures quickly and efficiently. Continuous network monitoring and data analysis can help identify potential issues before they become significant outages.
Regarding how Jordan can avoid such damage in the future, Al-Atoom noted that although the incident did not have widespread effects in Jordan due to limited reliance on CrowdStrike's services, it calls for vital sectors in Jordan to be cautious about relying on cloud infrastructure.
He suggested investing in a robust and distributed cloud infrastructure to reduce the risk of technical failures and building local data centers and recovery centers in geographically dispersed locations nationally and even internationally to ensure service continuity from alternative sites in case of primary site failures due to technical reasons or cyberattacks.
Al-Atoom highlighted the need to develop local capabilities and train personnel on the latest techniques and best practices in cloud system management, leveraging cloud services, and protecting systems from cyber threats. He also stressed the importance of collaborating with global technology companies to adopt the latest solutions and tools in cloud computing and cybersecurity and understanding their disaster management procedures, ensuring binding contracts hold these companies accountable for material and moral damages caused by service disruptions.
He suggested reviewing cloud computing-related legislation and policies and imposing more regulations on service providers, especially those handling critical services for citizens.
Strategic Technology Consultant Engineer Hani Al-Batsh proposed some solutions for the recent global technical glitch, advising users to follow certain steps such as checking for known service outages, troubleshooting by restarting the application or device or clearing the application's cache, reporting issues through official channels, and using offline alternatives.
Al-Batsh emphasized the importance of companies actively monitoring the situation, keeping employees informed about any issues and specified solutions, implementing internal procedures to handle such problems, including backup plans and communication protocols, and considering alternative cloud solutions or business continuity plans to minimize future disruptions.
From a technical perspective, Al-Batsh stressed the need to establish service recovery and continuity plans by using multiple methods, such as fiber lines from multiple service providers, satellite connections for essential entities, cloud hosting services, and having a local cloud or another provider.
Experts in information technology and cybersecurity have called on Jordanian companies to develop national products, tools, and solutions to face global technological risks. They told the Jordan News Agency (Petra) that it is important to have redundancy and backup systems for disaster recovery and service continuity, which should be activated in case of a primary system failure.
They emphasized the need for companies to continuously monitor the situation, keep employees informed about any issues and specified solutions, and implement internal procedures to handle such problems.
Nidal Bitar, CEO of the Information and Communications Technology Association of Jordan (int@j), highlighted the necessity for Jordanian companies to national products and solutions to address global technological risks, stressing the importance of digital sovereignty in the current era.
Bitar explained that digital sovereignty refers to a country's ability to control its destiny in the digital world, including the data, devices, and software it uses and develops. He pointed out that the concentration of control in a few global locations reduces the diversity of technology market options and gives excessive power to a few major tech companies.
Bitar called for a unified Arab strategy that considers the region's unique challenges to achieve digital sovereignty. Regarding the recent global technical glitch affecting several sensitive sites worldwide, such as banks and airports, Bitar underscored the importance of diversifying cybersecurity solutions and developing national ones, emphasizing that reliance on various systems and technologies reduces the likelihood of being affected by a single system failure.
He also highlighted the need for crisis preparedness through contingency and business continuity plans to handle potential technical outages, commending the efforts of the National Cybersecurity Center and other relevant bodies.
Bitar stressed the importance of investing in training and awareness to enhance security awareness among employees, continuous monitoring, and regular system updates to address new security vulnerabilities.
Regarding how Jordan can avoid similar damage in the future, Bitar pointed to the necessity of diversifying security technologies and not relying on a single security system, enhancing cybersecurity infrastructure by investing in technological infrastructure development and improvement.
He affirmed the importance of regular system testing to detect and address weaknesses before they are exploited by attackers, collaborating with international experts to benefit from the expertise of global institutions and companies in cybersecurity, and regularly updating systems to ensure they include the latest security updates.
Bitar called for developing local competencies and supporting education and training programs to develop the skills and expertise of cybersecurity professionals within the Kingdom to ensure sustainable protection.
Dr. Ahmed Al-Atoom, Head of the Cybersecurity and Cloud Computing Department at the Applied Science Private University, said that despite 'CrowdStrike' being one of the world's leading companies in information systems protection, its installation of an caused an unexpected glitch in some cloud security services and some Microsoft services, leading to varying outages globally.
Al-Atoom emphasized the importance of redundancy and backup systems for disaster recovery and service continuity, which should be activated in case of a primary system failure. He stressed that comprehensive testing and carefully managed updates should be conducted before implementing them in a live environment to prevent unexpected issues.
Al-Atoom stated that if the updates had been fully tested in a trial environment, they would not have caused such problems in live systems. He also emphasized the necessity of emergency plans and crisis management, encouraging companies to develop and review contingency plans and crisis management procedures to handle technical failures quickly and efficiently. Continuous network monitoring and data analysis can help identify potential issues before they become significant outages.
Regarding how Jordan can avoid such damage in the future, Al-Atoom noted that although the incident did not have widespread effects in Jordan due to limited reliance on CrowdStrike's services, it calls for vital sectors in Jordan to be cautious about relying on cloud infrastructure.
He suggested investing in a robust and distributed cloud infrastructure to reduce the risk of technical failures and building local data centers and recovery centers in geographically dispersed locations nationally and even internationally to ensure service continuity from alternative sites in case of primary site failures due to technical reasons or cyberattacks.
Al-Atoom highlighted the need to develop local capabilities and train personnel on the latest techniques and best practices in cloud system management, leveraging cloud services, and protecting systems from cyber threats. He also stressed the importance of collaborating with global technology companies to adopt the latest solutions and tools in cloud computing and cybersecurity and understanding their disaster management procedures, ensuring binding contracts hold these companies accountable for material and moral damages caused by service disruptions.
He suggested reviewing cloud computing-related legislation and policies and imposing more regulations on service providers, especially those handling critical services for citizens.
Strategic Technology Consultant Engineer Hani Al-Batsh proposed some solutions for the recent global technical glitch, advising users to follow certain steps such as checking for known service outages, troubleshooting by restarting the application or device or clearing the application's cache, reporting issues through official channels, and using offline alternatives.
Al-Batsh emphasized the importance of companies actively monitoring the situation, keeping employees informed about any issues and specified solutions, implementing internal procedures to handle such problems, including backup plans and communication protocols, and considering alternative cloud solutions or business continuity plans to minimize future disruptions.
From a technical perspective, Al-Batsh stressed the need to establish service recovery and continuity plans by using multiple methods, such as fiber lines from multiple service providers, satellite connections for essential entities, cloud hosting services, and having a local cloud or another provider.
comments
Jordanian Companies Urged to Develop National Tech Solutions Amid Global Risks
 
display options :
Full
Main image only
without images
comments