CASE STUDY: CYBERSECURITY FOR A TELECOM OPERATOR





An international telecom operator has selected Mazars to assess the level of security of their information system.

 

CONTEXT

The company is a French-headquartered, international telecom operator that has maintained an ERP for the management of its core business for many years. An evaluation of the security of this ERP was requested by the Administrative and Financial Department, where a number of risks related to its technical base were identified. Mazars was instructed to perform an intrusion test from the internal network of the company to simulate the attacks a hacker could take in order to identify any security gaps.

CHALLENGE

Telecom operators are extremely aware of security threats to their information system. They often apply a set of best practices and use technologies to strengthen their level of internal controls. In order to identify the risks that threaten the security of our client’s information system, a high level of technical expertise combined with a thorough experience of intrusion patterns and methods was necessary, along with the ability to provide clear and practical conclusions for a non-technical audience.

SOLUTION

Regular monitoring and training allows Mazars’ cyber security teams to use the most sophisticated and up-to-date intrusion techniques to put attack scenarios into practice and take control of the information system.

The Mazars teams were able to control the ERP of this client in order to demonstrate the weaknesses in their security.

Our consultants could have also performed external intrusion tests if the client’s ERP had been connected to the internet.

IMPACT

The intervention of our cybersecurity experts has permitted a reinforcement of the security principles to be implemented in our client’s ERP and in its IT environment.

THE + OF MAZARS

The technical mastery of the intrusion work allowed Mazars to quickly take control of the ERP, its data and the rest of the information system and thus demonstrate the weakness of the implemented system.

CONTACT US

ROY ANDERSON | PHONE: 212.375.6565 | EMAIL: ROY.ANDERSON@MAZARSUSA.COM

JONATHAN SOMER | PHONE: 646.435.1572 | EMAIL: JONATHAN.SOMER@MAZARSUSA.COM




Related posts




Electronic Data Interchange (EDI) EDI provides a standard and established framework for how data is formatted when sent, so that the EDI translation software of the receiver can receive and interpret it correctly. This allows the transfer of data electronically between two systems, eliminating the need for manual processing and

Read More



Challenge A leading commercial real estate firm that sells, finances, and services commercial real estate processed personal data as part of its core business. Because some of their operations were under the jurisdiction of California, they wanted to understand their risk exposure from the CCPA and to define a clear

Read More



As Denis Waitley once said, “Life is inherently risky. There is only one big risk you should avoid at all costs, and that is the risk of doing nothing.” Replace the word “life” with “business” and this still rings true. The water industry has long been aware of the disruption

Read More








Copyright 2021 - Mazars - United States