The Pakistan Telecommunication Authority (PTA) has successfully upgraded and reactivated its Web Management System (WMS), intensifying efforts to combat illegal mobile applications, websites, and online content.
Following the upgrade, PTA has ramped up its actions against digital platforms that violate national regulations. Official documents reveal that the WMS has so far blocked 183 mobile applications deemed unlawful, alongside 2,369 websites that were found to be hosting prohibited content.
Sources indicate that the WMS is effectively monitoring online content within its technical capabilities, ensuring that any platform found to be in breach of Pakistan's digital regulations is swiftly blocked.
The enhanced system is part of PTA's broader strategy to regulate the digital space and ensure that internet usage in the country adheres to legal and ethical standards.
Also Read: Slow internet to plague Pakistan for weeks to come
With the upgraded WMS, PTA continues to strengthen its oversight and enforcement capabilities, further solidifying its role in safeguarding the country's digital ecosystem.
Meanwhile, the Pakistan Telecommunication Authority (PTA) has started a comprehensive cybersecurity audit for telecom operators in a move to bolster cybersecurity across Pakistan.
This audit aims to ensure the robustness of cyber defenses within the country's telecom sector.
Also Read: PTA suggests finalizing VPN policy
According to sources, the PTA has directed world-class companies to conduct these audits, focusing on a thorough review of all technical aspects related to cybersecurity. The final evaluation will be carried out by the PTA to ensure that all cybersecurity measures meet international standards.
Key areas of the audit:
- The audit will assess whether telecom operators have effectively implemented the prescribed cybersecurity framework. It will also be reviewed whether the firewall is in place or not.
- The security clearance of staff members working for telecom operators will be reviewed to ensure that only vetted individuals handle sensitive information.
- Telecom operators will be scrutinized for measures in place to prevent leakage of user data, ensuring that personal and sensitive information remains secure.