Accessibility Tools

Skip to main content

Alaa Elsagier - Page 5 of 5

Author: Alaa Elsagier

Copilot pro joins the Microsoft 365 family of the organization

Welcome to Copilot Pro, the latest app to join the Microsoft 365 family in our app pack! ✅

Today Copilot Pro has been activated in our digital environment! It is an application launched by Microsoft as a tool that uses artificial intelligence to simplify and improve text writing.

This application came as a means used in preparing reports, correspondence, documents and code, to speed up the completion of tasks, make texts more accurate and clear, translate texts, and reduce the risk of errors.

With this new addition, we aspire as usual to enhance work efficiency, and to use the power of technology in the smallest detail

Information Security Compliance Certificate: Summary of the strategy and steps that enabled us to achieve the goal

Did you know that our National Information Security Compliance Certification was no coincidence? 🤔

Certainly, it will not be hidden from you that our acquisition of it was not born of the moment, but rather the fruit of tireless efforts and thoughtful plans that extended for months, we are pleased to reveal the most prominent stations today:

🔹 Environment:

  • A working group consisting of 5 permanent employees, 55 members and experts.

🔹 Target:

  • Forming a policy based on the guiding policy of the National Authority for Information Security and Safety in line with the materials, equipment, works, projects and members of the organization.

🔹 Goal:

Protect your Microsoft 365 environment comprehensively, including:

  • Email.
  • Digital assets.
  • Store backups.
  • Data security.
  • Data Leakage Prevention (DLP).
  • Information security operations.
Information Security Compliance Certificate: Summary of the strategy and steps that enabled us to achieve the goal

🔹 Cyber Security Strategy:

🔸 1. Basic Infrastructure:

  • Security of endpoints:

Use advanced solutions to ensure devices are protected from cyber threats.

  • Network Security:

Use advanced technologies to protect the network from hacks and cyberattacks.

  • Data Security:

Implement strict data protection measures from loss and unauthorized access.

🔸 2. User Security:

  • Identity and Access Management:

Implement strict policies to control access to data and systems.

  • Security Awareness and Training:

Continuous awareness of employees on the best practices of cybersecurity.

  • Data classification and protection:

Classify data according to its sensitivity and apply appropriate protection measures.

🔸 3. Additional security measures:

  • Device Management:

Implement strict policies to manage devices used at work.

  • Network monitoring and vulnerability management:

Continuously monitor the network to detect any threats or security vulnerabilities.

  • Incident Response:

Having a specialized team ready to deal with any security incidents that may occur.

🔸 4. Continuous improvement:

  • Review and update the cybersecurity strategy regularly.
  • Conduct periodic penetration tests and security reviews.
  • Keep abreast of the latest security trends and best practices.

🔹 Notes considered:

  • Design this strategy to be adaptable to specific needs and level of risk.
  • Use best practices in all areas.
  • Use a variety of solutions from Microsoft and other third parties.
  • Strong focus on user training and safety awareness.
  • Effectively monitor and manage the network to detect and respond to threats.
  • Continuously update your cybersecurity strategy to improve protection.

Thus, the organization met high information security standards, and put in place a strong bulwark that protects its information from lurking threats.

We are pleased to leave the summary of the strategy in your hands today, hoping to be a guide for the rest of the institutions in building their digital fortress, to be closer to a better ✨ technical future

You can view the certificate of compliance through the following link:

Obtaining Libya’s first national information security compliance certificate

A new building block in the edifice of the technical future | Libya’s First National Certificate of Compliance for Information Security!

With the efforts of our team, and the support of our partners, we are pleased to announce today that we have received the certificate of compliance with the Information Security and Safety Policies from the National Authority for Information Security and Safety – NISSA LIBYA.

This certificate, which is awarded for the first time to a national institution, puts it as a new building block, and a new achievement in the edifice of the safe technical future that we seek to build, and inspires us to continue working hard and to be a role model for all Libyan institutions.

We thank the National Authority for Information Security and Safety for the high professionalism in auditing, reviewing all policies and verifying our commitment to completing this stage of our journey.

We appreciate the times that have gone into and the tireless efforts of the WHO team to set up a secure technical system that meets the highest standards.

We appreciate the endless support of our partners in various aspects, their serious stand with us, and their belief in our mission, until we reached this point today, and let us launch with enthusiasm towards greater goals, and ambitions to transcend reality. Let’s build a secure Libya digitally!

Monday, 15/4/2024

The link to the news on the National Information Security and Safety Authority’s website:Nissa.gov.ly

NISSA LIBYA

Microsoft

Libyan Spider

Giga Ltd

Tazamun Tech

Albaraka Insurance

Holol Tech

الحداثة العالمية للاتصالات وتقنية المعلومات

Conclusion of the first internship program

Ending of the Internship Program at the Libyan Information Technology and Telecommunication Organization

The Libyan Information Technology and Telecommunication Organization is pleased to announce the successful conclusion of the internship program, which was organized with the aim of developing the capabilities of Libyan youth in the fields of ICT and management and enabling them to acquire the skills necessary to integrate into the growing labor market in this field.

Over the course of two months, a group of talented students and graduates participated in our intensive internship program, where they underwent comprehensive theoretical and practical training in various aspects of ICT and management. The trainees showed great enthusiasm and commitment, resulting in impressive results.

We would like to congratulate all the trainees on their outstanding achievement and appreciate their valuable efforts and contributions during the internship period. We are confident that they will become the future leaders of ICT in Libya.

We also commend the efforts of the organization’s dedicated team, who have done their best to provide a rich and supportive learning environment for the trainees.

We reaffirm our continued commitment to developing the capabilities of Libyan youth and enabling them to achieve their ambitions.

There is no doubt that the internship program has been a tremendous success by recruiting a number of its members, and we announce that we will continue to organize similar programs in the future with the aim of supporting Libyan youth and helping them achieve their full potential.

for more information about the program you can visit the following link: Internship Program – Libyan Technology Foundation

A request for a fatwa on the ruling regarding the acquisition and sale of counterfeit signal booster devices and their impact on local networks.

The Libyan Technology Foundation, formerly known as the Libyan Organization for Information and Communication Technology, reached out to Dar Al-Iftaa Libya to seek a religious opinion on the legal status of acquiring, selling, and purchasing counterfeit signal booster devices, which interfere with nearby towers. The response came in the form of an official fatwa numbered 5101, as follows:

Fatwa No. (5101)

Respected Sir/ Chairman of the Board of Directors of the Libyan Organization for Information and Communication Technology,

Peace be upon you, and God’s mercy and blessings,

In reference to your correspondence marked as (LOT-350), dated (24/01/2023), which included a query about the ruling on acquiring and selling mobile signal booster equipment that is not officially approved and causes interference that prevents coverage for residents within the range of the tower where these devices are used.

Answer:

Praise be to God, and prayers and peace be upon the Messenger of God, his family, companions, and those who follow him.

After that:
Adhering to the regulations and laws established to organize and achieve people’s interests is obligatory. If these devices are non-compliant with the specifications set by the responsible authorities and it has been proven that they cause harm to citizens by interfering with their coverage, then it is not permissible to acquire them, nor to engage in their sale or purchase. This is because they serve as an enhancement for their owner at the expense of harming others. It is not permissible for anyone to improve their situation by harming others. The Prophet (peace and blessings be upon him) said: “There should be neither harm nor reciprocating harm” [Muwatta Malik: 1429]. And God knows best.

And may the peace and blessings of God be upon our master Muhammad, his family, and companions.

Fatwa Committee at Dar Al-Iftaa:
Ahmed Milad Qaddour | Mufti
Hassan bin Salem Al-Sharif | Mufti
Sadiq bin Abdulrahman Al-Gharyani | Grand Mufti of Libya

14th Rajab 1444 AH | 05 February 2023 AD

Link to the Fatwa: