The following are the Public Notices issued by the Nigerian Communications Commission. By the publication of these notices in print, broadcast or online, the Commission seeks to inform the public of developments and upcoming actions relating to its activites and the Nigerian telecommunications industry.
The Nigerian Communication Commission’s Board Resolution at its 88th sitting held on Thursday 27th September, 2018 considered and approved the recommendation for the grant of Value Added Services – Aggregator Licence to the following 9 (nine) Companies:
- I-Cell Media Limited
- Nine Jojar Limited
- 21st Century Technologies Limited
- Nitro Switch Limited
- HML Consulting Limited
- Cognys Systems Limited
- Perpetual Communications Limited
- Mobile Intelligence Limited
- Iyke Jordan Limited
The Nigerian Communications Commission, pursuant to its powers under Section 70 (2) of the Nigerian Communications Act 2003 has developed Commercial Satellite Communications Guidelines (The Guidelines) for the telecommunications market in Nigeria.
The Guidelines which came into effect on November 21, 2018 regulates all Commercial Satellite Services in all Orbits in Nigeria.
By this notice, all commercial satellite Space Segment providers with footprints in Nigeria and Earth Station Operators are required to regularise their operations with the Commission as specified in the Guidelines on or before February 29, 2019.
Please note, it is a criminal offence to provide communications services without a requisite licence, authorization or exemption from the Commission.
To access the guidelines, Stakeholders are invited to visit
NIGERIAN COMMUNICATIONS COMMISSION
Monday, December 3, 2018
As the National Cyber Security Awareness Month comes to an end, it is important to note that cyber threats are persistent. Therefore it is imperative to be aware of emerging threats and preventive measures.
Cyber Security is our collective responsibility as users of the internet, for general online security is only as strong as the weakest link. Over the course of the month the NMIS department has been publicizing different themes to increase awareness on cyber threats and ways to counter them.
General Notices on online etiquettes and use –
Week 1 of the NCSAM focused on general security guidelines and online etiquettes that consumers should practice while on the cyberspace. Some of the tips shared are
- Only make online transactions on secure sites that have HTTPS.
- Share with Care; think before posting about yourself and others online. Consider what a post reveals, who might see it and how it might affect you and others now and in the future. Etc.
These practices and many more shared will help protect yourself and others - remember, users who are lazy with their mobile device security become easy targets for hackers and other cyber criminals
Security Tips for Parents, Administrators and Children –
Week 2 focused on ways Parents, Administrators and Children protect themselves and others while using social media. The issue of cyberbullying was tackled and advice was given to Parents and Administrators on how to monitor children online.
Building Resilience - Trends, Risks and Safeguards –
For week 3 trends and online threats like online banking fraud, fake news and Ransomware where discussed and safety tips was provided.
Provisions of the Cyber Crime Act 2015 –
The Cybercrime Act objectives was discussed and some provision of the Act were highlighted. This is to notify consumers that there is repercussion to illegal activities online. There are thirty two (32) offenses and penalties in the Cybercrime Act 2015, some of which were highlighted.
Continuous education of consumers on online safety, through awareness and sensitization campaigns will be done to empower them. This will make them aware of both the positive and negative potentials available online and measures to take in safeguarding themselves.
It is always important to remember that Cyber Security is our collective responsibility as stakeholders in the cyberspace. We should please ensure that we follow all the safety tips and advice provided over the cause of the Nation Cyber Security Awareness Month (NCSAM).
The message was brought to you by the NMIS department of the NCC.
The Cybercrime Act was enacted into law by the President of the Federal Republic of Nigeria in March, 2015. The objectives of this Act are to:
- Provide an effective and unified Legal, Regulatory and Institutional Framework for the Prohibition, Prevention, Detection, Prosecution and Punishment of Cybercrimes in Nigeria;
Ensure the protection of Critical National InformationInfrastructure; and
- Promote Cyber Security and the protection of Computer Systems and Networks, Electronic Communications, Data and Computer Programs, Intellectual Property and Privacy Rights.
TRENDS, RISKS AND SAFETY TIPS
Society’s reliance on the internet for daily activities and transactions has left it open to risks of cyber-attacks. New trends are also constantly emerging in cyberspace accompanied by new online threats. Find below some of the trending online threats and tips to safeguard yourself against them.
Online Banking Fraud
The internet is now the favoured mode for performing financial transactions checking one’s bank balance, requesting for bank statements and cheque books, upgrading debit cards and even purchasing goods online. Most of the transactions are conducted via payment cards, debit and credit cards, and electronic channels, such as ATMs. Therefore, both private and public banks as well as other financial institutions are becoming increasingly vulnerable to sophisticated cyber-attacks.
Safety Tips for Online Banking
- Onscreen Keyboard: This would be the easiest way to protect your password from being recorded by key-loggers, especially at public terminals. All banks have this option available to input username and password. A key-logger, which can be hardware or an application installed on the computer, records and passes on information about the keyboard taps you make. Using this information, it would be easy to find your username and password. While software loggers are hard to spot, hardware loggers will have to be an attachment to the terminal. However, know that an on-screen keyboard is not fool-proof by itself.
- Browsers save pages you have viewed on your computer so that it can be accessed quicker if you wish to view it again, such as when you use the 'back' button. By clearing your cache after visiting your net banking account, you make sure no one else can view the confidential information you have viewed.
- Also, don't select the option on the browser that stores or retains user name and password, i.e. auto complete. It wouldn't take too long for a program to get that information from your browser.
- Keep your operating system and browser up-to-date with the latest security patches. Install these only from a trusted website. Apart from public terminals, also avoid locations that offer online connections through wireless networks (Wi-Fi), where privacy and security are minimal.
- If you have a computer at work running on a big network, it is likely that it is much safer than your home PC. Its level of security can be measured (roughly) by how strict the limitations are on its use.
Deliberate sharing of wrong information by people with huge followership on social media. Certain sources are known to play it fast and loose with headlines and facts. Others make up stories altogether.
Tips for recognizing fake news:
- Look at the tone of the articles on a website to get a sense of what kind of stories it produces. If featured stories are about aliens, miracle cancer cures and the like, you’ll get a sense of the seriousness of the publication, which is a good indication of its integrity.
- When checking the legitimacy of a news story, consider this:
Search keywords from the story and topic on a search engine. What results come up? If legitimate sites are running the same story, it’s likely true. But if all the search results you find cite the same original source where you found the initial story, which may be a red flag.
- Check if the address of the website has an odd domain name. Other tricks include incorporating a real website’s address into its address, such as cnnrealnews.com instead of cnn.com. Another is nearly using the name of a legitimate news site but misspelling it.
- One of the biggest ways fake news sites have been effective is by tapping into people’s fears and emotions. Many fake news stories purposely play on fears and anxieties, knowing that doing so will make people follow their emotions. Take a deep breath, step back and evaluate what you’re reading and who is writing it.
This is a malware software that is sent to user’s computers to hold the computers hostage. An example of such, is the wannaCry ransomware attack that was targeted at computers with Microsoft operating systems by encrypting data and demanding ransom payments in the bitcoin currency.
Safety tips on Ransomware:
- Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
- Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
- Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from your service provider. Be sure to contact your service provider if you or your family or friends receive suspicious calls.
- Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.