We Take Security Seriously

Telenor is committed to implementing industry-leading security measures to help protect and future-proof our customers business.

Home / About Telenor IoT / We Take Security Seriously

Cyber Security at Telenor

Cyber security has been, and continues to be, a top priority for Telenor since the company’s creation, around twenty years ago. Our goal is to prevent and reduce the effect of a range of threats, including the ability to swiftly detect and respond to unwanted activities.

Our approach to cyber security incorporates preventive controls, including monitoring and detection, vulnerability assessments and incident management and response across all our business units and markets.

Threats

Advanced threat actors are increasingly aiming to steal information, modify customer data or make services unavailable. We can see a trend in which attackers attempt to find open doors through applications and lower level infrastructure to gain access.

Other common threats include identity theft or privacy breaches, ransomware, insider threats and attacks to either alter systems or information or bring services down (denial-of-service attacks).

How we Work with Cyber Security

As a responsible business, Telenor understand that advanced security solutions are essential to handle a wide range of evolving cyber threats. Telenor is constantly developing its security efforts, in line with the current external threat picture and preparing for potential future threats.

Our priority is always to protect our customers’ data in compliance with relevant authorities and legal frameworks.

To make it easier for customers and partners to understand how committed Telenor is to cyber security we routinely seek external certification.

If you would like to enquire for questions related to cybersecurity at Telenor Connexion or have an incident to report, please send us an email on security [at] telenorconnexion.com.

You can also find more information on cyber security on Telenor Group´s website.

Certification

Following an extensive auditing process, performed by Intertek, a multinational assurance, inspection, product testing and certification company, Telenor Connexion was awarded the ISO 27001 certification on September 25, 2019. The certification was awarded in recognition of Telenor Connexion’s commitment to provide its customers with the highest level of information security management.

ISO 27001 is a globally recognized standard that describes how to manage information securely. The standard has become the most popular information security standard in the world, with hundreds of thousands of companies attempting to get certified each year. Telenor Connexion was awarded the ISO 27001 certification on its first attempt, further showcasing the completeness of its information security program.

This latest certification builds on the company’s trustworthy reputation. In 2016, Telenor Connexion became ISO 9001 certified, another international standard that specifies requirements for a quality management system. The standard is used to assess a company’s ability to meet statutory and regulatory requirements related to a product or service as well as the needs of customers and other key stakeholders.

We understand that our customers require the highest level of data security in accordance with industry best practices and standards. Achieving certification is further recognition of Telenor Connexion’s commitment to cyber security and that we are meeting the extreme standards we set for ourselves and for our customers.

Certifications

Our certifications verify our dedication to providing our customers with the highest levels of service, quality management and data security.
Download certifications (PDF)

Related Content

How to Keep IoT Secure as You Scale Up

The security landscape continues to evolve with lone hackers as well as nation state-sponsored criminal organizations increasingly focusing attacks on larger, corporate-level targets. In this white paper, we explore how cybercrime is changing and the steps being taken to ensure IoT products are secure.
Read more

IoT terminology guide - IoT security

What are the IoT security risks, considerations and issues for the near future?
See IoT security issues and definitions