Connect with us

GRTech

Exchange of info among MDAs crucial to public service transformation- Pantami

Published

on

It is an obvious fact that applying information technology (IT) for governance holds tremendous potential to improve the way governments deliver public services.

But, the National Information Technology Development Agency (NITDA) is worried over the Ministries, Departments and Agencies’ (MDAs) approach to e-government which has been in silos.  

NITDA’s DG, Dr. Isa Pantami, stated the Agency’s position at Stakeholders’ Engagement on Nigeria e-Government Interoperability Framework (Ne-GIF), held in Abuja on Tuesday.

He said, it is worthy to note that seamless exchange of Information between various MDAs’ IT infrastructure and applications is critical to cross-portfolio service delivery and public service transformation.

However, NITDA is committed to change the narrative by working closely with stakeholders to remove existing barriers caused by silo deployment of IT solutions. The barriers have made information sharing a nightmare among MDAs.

NITDA was established in 2001 to implement National Information Technology Policy, give effect to provisions of the NITDA Act, 2007 and coordinate general IT development and regulation in the country.

 

Pantami’s message at the occasion:

“We recognize the enormity of the responsibilities placed on the Agency as well as the possibilities of IT or e-Government as a development resource for achieving socio-economic transformation. e-Government and ICT tools can among other things, cut down the cost of governance, improve national economic growth; enhance access and quality of services as well as render public agencies more transparent and accountable.

Accordingly, at this information age, going digital for any government is the optimal route to attain Sustainable Development Goals (SDGs). 

Nigeria as a developing country has her own share of good experience of e-Government or ICT adoption for streamlining and improving governance. Such good initiatives where Nigeria has recorded success in using ICT to drive government policies include Treasury Single Account (TSA), Integrated Personnel Payroll Information System (IPPIS), Government Information Financial Management Information System (GIFMIS), Bank Verification Number (BVN), e-Taxation,  e-passport, e-wallet for farmers among others.

The implementation of TSA and IPPIS/BVN saves Nigeria N4.7 Billion and N20 Billion respectively every month and assist in the elimination of ghost workers in various MDAs.

However, the Nigerian government is becoming more complex and wide-reaching than ever before and citizens believe and expect that public services must be delivered effectively and at speed.

Silo e-Government systems would not help Government deliver public services efficiently.  Advanced phases of service innovation cannot be achieved without integrating many back-office functions.

For instance, registering a Limited by Guarantee Company in Nigeria requires visit to at least three institutions: CAC, FIRS, and Attorney General of the Federation physically and/or through their portals.

This is inefficient, inconvenient, time consuming and makes citizens pay more. Through robust e-Government applications, I t is possible to make the transactions and get the service delivered on a single portal.

Citizen-centered service delivery involves breaking up silos, integrating across agencies, innovating new ways of doing business, and creating a service-focused culture.

It has been proven that one of the strategic directions for e-government is to adopt a Whole-of-Government (WoG) approach for deriving expected value from IT. WoG involves back-end offices re-engineering, consolidation and integration of business processes across government agencies to deliver effective and consolidated services through the front-end offices at an affordable cost.

WoG is a deliberate path to attain Government Digital Transformation (GDT) we desire. GDT views Government as an entity by promoting the idea of ONE GOVERNMENT but still respect individual MDA’s mandates while providing government digital services.

Fundamentally, e-Government or digital service delivery has three models or approaches: Government-to-Government (G2G), Government-to-Business (G2B) and Government-to-Citizens (G2C). Transforming G2G is the foundation for providing efficient digital services. It enables and drives the other delivery models.

However, the workability of any G2G is determined by the level of IT systems integration and standardization considering the social, institutional, legal, economic and political systems of a particular country.

The main difficulty in achieving advanced G2G is the interoperability requirements of IT systems of various government agencies. For instance, compliance with Executive Order 001 requires advanced G2G. A provision in the Executive Order 001 stipulates that “an MDA that requires input documentation, requirements or conditions from another MDA in order to deliver products and services on applications within the originating MDA’s remit or mandate, including permits, licenses, waivers, tax documentation, filings and approvals shall only request a photocopy or other prima facie proof from the applicant.

It shall be the responsibility of the originating MDA to seek verification or certification directly from the issuing MDA”.

How can this happen seamlessly when information is not digitally shared in an efficient manner between MDAs that are involved. This requires advanced G2G to provide the needed services to businesses and citizens.

The Government Digital Transformation Agenda led the Management under my leadership to come up with a Strategic Road Map based on seven-point focus areas: Capacity Building, IT Regulation, Digital Job Creation, Government Digital Service Promotion, Local Content Development and Promotion, Cyber Security and Digital Inclusion.

At least five of these focus areas are geared towards Government Digital Transformation. They are capacity building, government digital services promotion, cybersecurity, IT regulation and local content development and promotion.

Specifically, Government Digital Service Promotion and IT Regulation are targeted at transforming the way government provides digital services thereby making GDT a reality.

This has informed our decision to set up a dedicated department- e-Government Development and Regulation to champion the cause of Government Digital Transformation.

The department has an endorsed Strategy as a guide and template towards achieving the desired GDT. The Strategy is a by-product of the Agency’s Strategic Road Map and Ne-GIF is a critical component of GDT agenda. 

Our national peculiarities in terms of multi-tribal society, population, huge demand for accessible public services, new challenges of agitations, security and terrorism among others demand integrated services and collaborative governance.

Moreover, the legitimacy of any government, in this age of knowledge economy and information society, requires full-scale inclusion, participation and co-creation of customized and personalized services for citizens. All these necessitate the shift from a silo-based to a cross-portfolio service delivery approach by Ministries, Departments and Agencies (MDAs).

The shift necessitates integrated policies and programs, collaborative and collective responses to social problems, promotion of shared infrastructure and applications as well as the need to leverage on comparative advantages of various agencies in order to maximize value from e-Government investments.

As mentioned earlier, Ne-GIF is a critical enabler for cross-portfolio services, WoG and GDT agenda.

Way forward

To achieve the needed integration preached by WoG principles, there is a need for a framework that guarantees interoperability of IT infrastructure and applications.

Regrettably, Nigeria, with all her efforts at deploying IT infrastructure and/or e-Government systems, is yet to develop one.

Therefore, the National Information Technology Development Agency (NITDA) whose primary mandate is to regulate and develop IT in the country as stipulated in the NITDA Act of 2007, has developed the draft Nigeria e-Government Interoperability Framework (Ne-GIF) to close the identified gap.

The Agency is presenting the draft Framework before you as our major stakeholders for inputs, comments and corrections. Most importantly, we implore you to own the Framework and ensure its smooth implementation and compliance. Developing the Framework is one thing, compliance and implementation is another.

If we all believe that Interoperability Framework is essential for Government Digital Transformation in Nigeria, I implore us to put resources together for its implementation.

It requires strong political and leadership will by MDAs and collective commitment by all stakeholders in the Public and Private sectors.

The Ne-GIF provides tools, specifications and recommendations that are based on Standards for supporting MDAs in undertaking interoperability of e-government solutions for the provision of cross-portfolio services.

My vision in NITDA is to facilitate and lead government digital transformation and ensure NITDA plays a critical role in building a digitally transformed government.

Leveraging on ICT to ensure seamless information exchange is a prerequisite to achieving ERGP objectives, Sustainable Development Goals by United Nations and attaining our desired Government Digital Transformation Agenda. We need to build capacity and ensure the right leadership is provided across MDAs.

Recently, we have been engaging MDAs and other stakeholders on different fronts.

It, however, requires concerted efforts. We can’t do it alone; we need the support and cooperation of MDAs, IT sector players, the National Assembly and other stakeholders”.

Source: TechEconomy.ng

GrassRoots.ng is on a critical mission; to objectively and honestly represent the voice of ‘grassrooters’ in International, Federal, State and Local Government fora; heralding the achievements of political and other leaders and investors alike, without discrimination. This daily, digital news publication platform serves as the leading source of up-to-date information on how people and events reflect on the global community. The pragmatic articles reflect on the life of the community people, covering news/current affairs, business, technology, culture and fashion, entertainment, sports, State, National and International issues that directly impact the locals.

GRTech

SHELT SI Achieves Cisco Select Partner Certification

Published

on

SHELT and CISCO

SHELT System Integration (SHELT SI) has announced its achievement of Cisco Select Partner certification in Nigeria, marking a significant milestone in its commitment to delivering top-tier networking and security solutions to businesses across the region.

This certification underscores SHELT SI’s dedication to excellence in providing innovative networking and security solutions tailored to meet the evolving needs of the market.

The Cisco Select Partner certification is a validation of SHELT SI’s technical expertise and commitment to customer satisfaction, as well as its ability to deliver cutting-edge networking and security solutions that drive business success. With this recognition, SHELT SI is affirming its ability to further enhance its offerings and support its clients in navigating the complexities of the digital landscape.

Cisco Nigeria General Manager Sebastine Nzeadibe comments: “We are delighted to welcome SHELT SI to the ranks of Cisco Select Partners in Nigeria. Their demonstrated commitment to excellence and customer satisfaction aligns perfectly with our values, and we look forward to collaborating closely together to empower businesses with transformative networking and security solutions.”

Youssef Abillama, CEO of SHELT, comments: “Achieving this certification strengthens our relationship with CISCO and is a testament to our team’s dedication and expertise in delivering best-in-class solutions. This milestone reinforces our commitment to empowering businesses in Nigeria with innovative technology solutions that will enable them to thrive in the digital age through cutting-edge technology solutions.”

SHELT’s Country General Manager, Walid Bou Abssi, added, “The Cisco Select certification empowers us to provide an increased level of support and further enhances our ability to address the requirements of our clients’ evolving needs in Nigeria. It is an acknowledgement of the ability of our pre-sales, sales, and client support teams to design, quote, deploy, and support Cisco solutions.”

Continue Reading

TechNews

SIM Boxing, And The Unboxing of a Crime Syndicate

Writer: Suleiman Bala Bakori

Published

on

SIM card

Boxes have a multitude of uses, and the word “box”, lends itself to diverse contexts. For “Ajala Travelers,” the box is a necessity for keeping goods for their endless journeys. In literature, idiomatically, it can be said that “one has been boxed into a corner;” another might say to deal with a conundrum: “think outside the box;” then there is the “Pandora’s box” that no one wants opened.

To “box one’s ear’s” refers to a hit on the head, especially around one’s ears. For those who celebrate Christmas, “Boxing Day,” which is the 26th of December, the second day of Christmastide is not to be joked with: A day to unbox gifts. So much for the box.

Another type of boxes exists in the telecommunications world: The SIM Box. Have you ever received an international call but saw a local phone number ring in? That is SIM Boxing in action. Let me explain.

SIM boxing happens when a person uses a special equipment, what is called a SIM Box containing tens to hundreds of SIM Cards—from 32, to 96, to 512 and more SIMs —to terminate international calls by bringing in the international call into the SIM Box using internet connections and regenerating the calls to the called party from one of the hundred SIMs in the box.

This way, the called party will see the local number of the SIM from the SIM Box, and not the original international number calling.

With SIM Boxes, the syndicate charges international call carriers lower rates than what regular Nigerian telecommunications operators would charge, as they do not have to pay the full cost of maintaining and operating a phone network.

Basically, they are bypassing the normal route for international phone call termination to terminate international calls cheaply and making windfall profits off it.

Take for instance, a telecommunications operator in Nigeria would ordinarily charge international carriers 10cents per minute for terminating an international call in Nigeria. However, by routing the call through a SIM Boxing syndicate, the international telecommunications carrier only pays a fraction of the charge to the syndicate, say 5cents per minute and does not have to pay the full 10cents per minute charge.

The SIM Boxer will terminate this call to the called subscriber at a rate of, say N15 per minute using one of the SIM cards in their SIM Box. The SIM Boxer thus makes a killing from the differential between the rate charged to the international carrier and the rate paid to telecommunications operators whose SIM they utilise in their SIM Boxes, at the expense of our national security and income of mobile network operators and quality of our service to consumers.

Asides the revenue loss that local mobile network operators suffer courtesy the activities of these syndicates, networks face congestion around areas where the illegal call routings via SIM Boxing occurs. With the huge traffic from the boxes, callers around the area see more dropped calls, poor call quality, and slower data speeds.

The introduction of the linking of National Identity Numbers (NIN) to SIMs is one way the Federal Government has worked to tackle this criminal enterprise. With every SIM in the country being linked to an NIN, an identity is tied to the owner of each line, and regulators now have visibility of ownership. That is not all. There is also the “Max-4 Rule” where a subscriber is not allowed to have more than four lines per network operator linked to his NIN. With this rule in place, coupled with the NIN-SIM Linkage, every telephone subscriber in Nigeria would not just be accurately identifiable but limited to having only four telephone lines per subscriber.

To enforce this rule, the Nigerian Communications Commission (NCC) on the 29th of March 2024 announced the deadline for Mobile Network Operators to bar all subscribers who had five lines and above, and whose NIN failed the verification test of biometrics matching.

Over the last few weeks, sources within the NCC have confirmed cases where a single NIN was linked to over 100,000 lines.

Some NINs had well over 10,000 SIMS linked to them, others over a thousand, others had hundreds. Many have questioned the reports and asked, what would any single reasonable person be doing with these number of lines? Justifiable questions, because no sane person—who is not running a business—should own more than five SIM cards.

Given the ‘Max 4 Rule’ in place and the NIN-SIM Linkage Policy, SIM Boxers have been boxed into a corner.

The applications they use require tens to thousands of SIM Cards, and the imperative to stay anonymous. If these policies are well and fully implemented, this is the death knell for SIM Boxing merchants.

But the regulator, NCC needs to be fast and ready for the battle ahead. SIM Boxing is a billion-dollar criminal enterprise. They are not going to go down without a fight. It is like taking a bone being chewed from the mouth of a bulldog.

Already, the battle seems to have kicked off. A lawyer, Barrister Olukoya Ogunbeje has recently taken the Federal Government, NCC and Mobile Network Operators to court, claiming that the barring of SIMs not linked to NINs goes against his fundamental human rights, and has cost him the loss of business opportunities.

Anyone who has Nigeria’s interest at heart ordinarily supports this policy. It then does not add up seeing a so-called activist lawyer take up such a matter that is clearly against the public interest—unless this is the Haka cry of SIM Boxers.

A most interesting observation with his case is that it is not even a class action, but individually driven. It begs the question then, who is funding Barr. Olukoya Ogungbeje? What is his interest in fighting this policy that puts paid to the business of a criminal enterprise? Is he funded by interests in the SIM Boxing world? Time would tell. But in the meantime, NCC must go head on without fear or intimation and clean the Augean stable of SIM ownership in Nigeria.

Suleiman Bala Bakori is a researcher, and writes from the FCT.

Continue Reading

GRTech

Sophos Partners with Tenable to Launch New Sophos Managed Risk Service

Published

on

Sophos Partners with Tenable

. New Fully Managed Solution Provides Visibility, Risk Monitoring, Prioritization, Investigation, and Proactive Notification to Prevent Cyberattacks  

April 4, 2024 – Sophos, a global leader of innovative security solutions that defeat cyberattacks, today announced a strategic partnership with Tenable, the Exposure Management company, to provide Sophos Managed Risk, a worldwide vulnerability and attack surface management service.

The new service features a dedicated Sophos team that leverages Tenable’s exposure management technology and collaborates with the security operations experts from Sophos Managed Detection and Response (MDR) to provide attack surface visibility, continuous risk monitoring, vulnerability prioritization, investigation, and proactive notification designed to prevent cyberattacks.

The modern attack surface has expanded beyond traditional on-premises IT boundaries, with organizations operating frequently unknown numbers of external and internet-facing assets that are unpatched or under protected, leaving them vulnerable to cyberattackers.

This is evident in the newest Sophos Active Adversary Report, also released, which identifies three tasks that organizations must prioritize to minimize the risk of brazen intrusions that lead to ransomware or other types of attacks.

These include closing exposed Remote Desktop Protocol (RDP) access, enabling multi-factor authorization and patching vulnerable servers, all of which were top entry points in breaches handled by Sophos Incident Response in 2023.

The Sophos Managed Risk service can assess an organization’s external attack surface, prioritize the riskiest exposures, such as open RDP, and provide tailored remediation guidance to help eliminate blind spots and stay ahead of potentially devastating attacks.

“Sophos and Tenable are two industry security leaders coming together to address urgent, pervasive security challenges that organizations continuously struggle to control. We can now help organizations identify and prioritize the remediation of vulnerabilities in external assets, devices and software that are often overlooked. It is critical that organizations manage these exposure risks, because unattended, they only lead to more costly and time-consuming issues and are often the root causes of significant breaches,” said Rob Harrison, senior vice president for endpoint and security operations product management at Sophos. “We know from Sophos’ worldwide survey data that 32% of ransomware attacks start with an unpatched vulnerability and that these attacks are the most expensive to remediate. The ideal security layers to prevent these issues include an active approach to improving security postures by minimizing the chances of a breach with Sophos Managed Risk, Sophos Endpoint, and 24×7 Sophos MDR coverage.”

“While the latest zero day may dominate the headlines, the biggest threat to organizations, by a large margin, is still known vulnerabilities – or vulnerabilities for which patches are readily available,” said Greg Goetz, vice president of global strategic partners and MSSP, Tenable. “A winning approach includes risk-based prioritization with context-driven analytics to proactively address exposures before they become a problem. Sophos Managed Risk, powered by the Tenable One Exposure Management Platform, delivers outsourced preventive risk management, enabling organizations to anticipate attacks and reduce cyber risk.”

Specific key benefits of Sophos Managed Risk include:

  • External Attack Surface Management (EASM): Advanced identification and classification of internet-facing assets, such as web and email servers, web applications, and public-facing API endpoints
  • Continuous monitoring and proactive notification of high-risk exposures: Proactive notification when a new critical vulnerability is identified in an organization’s internet-facing assets
  • Vulnerability prioritization and identification of new risks: Swift detection of high-risk and zero-day vulnerabilities, followed by real-time notification to ensure critical internet-facing assets are promptly identified, investigated and responded to by order of importance

“One of the biggest challenges organizations face when improving their security posture is prioritizing what to handle first. This type of guidance helps solve that issue and reduces the workload for security teams tasked with tackling vulnerability and exposure management,” said Craig Robinson, research vice president of Security Services, IDC. “Solutions such as Sophos Managed Risk can be a differentiator by enabling overwhelmed teams to take a more holistic approach to continuous monitoring and threat management.”  

Sophos Managed Risk is available as an extended service with Sophos MDR, which already protects more than 21,000 organizations globally. The Sophos Managed Risk team is Tenable-certified and works closely with Sophos MDR to share essential information about zero-days, known vulnerabilities and exposure risks to assess and investigate possibly exploited environments.

“Sophos Managed Risk simplifies the difficult and resource consuming task of identifying vulnerabilities, really understanding the extent of risk exposure, and prioritizing necessary remediations,” said Kieron Stone, cybersecurity business development manager at Phoenix Software Ltd. “As a trusted managed service provider (MSP), this is a service we’re proud to stand behind, and nearly all our customers using it have already discovered significant vulnerabilities that they were previously unaware of. For organizations that don’t already have a well-defined vulnerability patching cadence, this is a must-have service for the identification of vulnerabilities and building that schedule; and for organizations that are already managing vulnerabilities, it’s a second set of eyes for added peace of mind that they’re not missing anything.”

Organizations benefit through regular interaction, including scheduled meetings with Sophos experts to review recent discoveries, insights into the current threat landscape, and recommendations for remediation and prioritizing actions. Additionally, organizations can initiate inquiries via the Sophos Central platform, allowing users to directly engage with the Sophos Managed Risk team for tailored support, reports and to review their latest prioritized alerts.

“You can’t fix what you can’t see. Sophos Managed Risk is shining a light on areas of exposure that require remediation in order to keep customers protected. Combining Sophos’ elite MDR experts with Tenable’s industry-leading exposure management technology gives us a full picture view of vulnerabilities with the guidance we need to minimize risk,” said Brooks Roy, president at Communications Consulting, Inc. “The real value add for us as a channel partner is having the ability to easily manage Sophos Managed Risk’s prioritized alerts across our customer base on the Sophos Central dashboard.”

Sophos Managed Risk is available with a term license through Sophos’ global network of channel partners and Managed Service Providers (MSPs). A Sophos MSP Flex version will be available in 2024.

Continue Reading

Trending