DNA BusinessDNA Businesshttps://www.dna.fi/c/blogs/find_entry?p_l_id=8876292024-03-29T09:51:02Z2024-03-29T09:51:02ZHelicopter drones, security issues, and the carbon footprint: an international mobile industry summit revealed today’s technological hotpointsMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=175740492024-03-15T04:54:57Z2024-03-14T03:00:00Z<p class="ds-lead-paragraph">AI-operated robots, helicopter drones capable of personnel transport, a Formula racer, and metaverse worlds were on display in Barcelona at the 2024 Mobile World Congress, the world's largest annual mobile industry event. </p> <p>Behind many of these fascinating curiosities was a focus on customer value: harnessing investments into increasingly advanced 5G networks for the benefit of the customer. 5G services are now available in 101 countries worldwide, and this global event provided an excellent venue for comparing lessons learned and plans for further development. </p> <p>The massive four-day event brought together over a hundred thousand participants, including operators, network and device manufacturers, and cloud service companies. I participated in a group of executives and experts from DNA and the Telenor Group. Here is a summary of a few of the event's key themes: </p> <p><strong>1. 5G FWA (Fixed Wireless Access)</strong> was a topic broached often. Fixed-point installation to home or office environments yields speeds nearly equivalent to fiber optics, with added flexibility and affordability, and without the need to lay cables. The combination of stable connectivity, low latency, and high capacity enables everything from running critical business applications to playing online games with super-low latency. 5G FWA has long been a staple of DNA’s offering, and the technology is now gaining significant traction in many other markets. </p> <p><strong>2. 5.5G</strong> is a step towards the era of 6G. Data speeds reached tenfold from before, signifying new use case possibilities and a significantly increased number of concurrent devices. The 5.5G standard will soon be ready for the market, and the ecosystem, including devices, is expected to evolve rapidly during 2024. DNA offered a glimpse into the possibilities of 5.5G even before the MWC event, as a demo environment built in Helsinki <a href="https://corporate.dna.fi/press-releases?type=stt1&id=70072668&scrollTo=UJpEOgFgPw1f&status=all&returnUrl=https%3A%2F%2Fcorporate.dna.fi%2Fpress-releases%3FscrollTo%3DUJpEOgFgPw1f">achieved transfer speeds of 10 gigabytes</a>. </p> <p><strong>3. As expected, AI (Artificial Intelligence)</strong> took center stage at the event. With AI, new services can be offered, existing functionalities improved, network performance optimized, and customer experiences enhanced further. On the other hand, AI increases the service capacity required from networks. At the event, <a href="https://www.telenor.com/media/newsroom/press-releases/telenor-group-announces-collaboration-with-nvidia-to-support-its-ai-first-ambition/" target="_blank">Telenor announced a partnership with Nvidia</a>, which will strengthen our investment in implementing AI into our operations in the Nordics. </p> <p><strong>4. Security</strong> was more prominently featured than previously—no doubt in response to concerns raised by geopolitical tensions and increased risk factors. At Telenor's event at the MWC, Strengthening Nordic Digital Security: Protecting People and Networks, two ministers and the cyber security director of the Norwegian Armed Forces discussed prevalent topics. A key theme was boundless Nordic cooperation between governments and businesses to secure the region. Security is a collective issue that no single entity can solve alone. </p> <p><strong>5. Sustainable development</strong> received significant attention in technology discussions. Modern 5G networks require less energy than previous technologies, and AI can be utilized to reduce network energy consumption while optimizing operations. From the operator's perspective, sustainable development combines reducing singular environmental footprints, requiring matching efforts from subcontractors and partners, and creating services enabling customers to reduce their carbon footprint.</p> <p>Alongside many discussions on 5G networks, viewpoints stretched into the far-flung future and the era of 6G networks. However, we are still a long way from 6G standardization: a hot topic at next year's MWC, no doubt! </p>Mariela Pulkkanen2024-03-14T03:00:00ZTelenor emphasised the importance of Nordic cooperation at the Mobile World CongressMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=175656712024-03-14T07:41:51Z2024-03-12T06:30:00Z<p class="ds-lead-paragraph">At the end of February 2024, the Mobile World Congress brought together the top of the mobile industry, from tele operators to device manufacturers. The Telenor Group, which includes DNA, highlighted the importance of Nordic cooperation in the field of cybersecurity. What should the Nordic cybersecurity work be based on? This question was particularly answered by the Digital Security report announced at the event.</p> <p>As part of the Mobile World Congress, Telenor’s event 'Strengthening Nordic Digital Security: Panel on Nordic Cooperation' discussed the importance of close cooperation in the field of cybersecurity. Modern society requires a robust and secure digital foundation to function, as states and companies depend on reliable cloud and data network services.</p> <p>The event featured, among other things, thoughts from the Minister for Transport and Communications, <strong>Lulu Ranne</strong>, and the Norwegian Minister for Digitalisation and Public Administration, <strong>Karianne Oldernes Tung</strong>, on changes in the global security environment and strengthening digital security capabilities.</p> <p>"When we look at the security situation from Finland’s perspective, security fundamentally starts with us. As the global situation becomes increasingly challenging, Finland needs to be part of a strong network of techno-democracies. Our trusted partners are the Nordic countries, Germany, Spain, the USA, and the Netherlands. By working together at a concrete level, we are already ahead regarding threats,” Ranne summarises.</p> <p>The importance of strengthening digital resilience in each Nordic country was highlighted both at the event and in the report – this will require systematic cooperation. Considering the constant changes in the global landscape, companies should be ready to navigate uncertainties and adapt to new circumstances. The Nordic initiative to better utilise technical solutions and infrastructure – such as fibre and data centres – would strengthen national security by ensuring more resources closer to home.</p> <p>"Each speaker and each speech at the event emphasised that the cyber threats challenging cybersecurity are real. Nordic cooperation is a great opportunity to intensify threat prevention at many levels: through states, public administration, and companies," says <strong>Johan Flykt</strong>, DNA's Director of Corporate Sales, responsible for small and medium-sized companies, who visited the event.</p> <h2 class="h3">The status on cybersecurity </h2> <p>The newly released <a href="https://www.telenor.com/binaries/about/our-companies/nordics/digitalsecurity/2023/digital-security-2023.pdf" target="_blank">Digital Security report</a> underlines that it is currently essential to develop, build, and utilise digital infrastructures to achieve high-level security, resilience, and supply security. Cybersecurity starts with identifying risks and preparing for them, and the report provides a comprehensive situational analysis of the current most important phenomena affecting cybersecurity.</p> <p>"I wish that every company would internalise what the situation is currently on the cyber threat front. At the moment, many have too rosy picture of reality and it is easy to think that threats mainly concern only critical actors. However, this is not the case, as they concern each one of us – regardless of industry or location," describes Flykt.</p> <p>Since DNA became part of the Norwegian Telenor Group, the Nordic and global cooperation, ranging from connections to cybersecurity has been further strengthened. Leveraging expertise and capabilities across various sectors throughout the Nordic countries can also open new business opportunities in the field of cybersecurity.</p> <p> </p> <p><strong>Since DNA became a part of the Norwegian Telenor Group, Nordic and global collaboration in connectivity has strengthened further. <a href="https://www.dna.fi/dnabusiness/blogi/-/blogs/dna-s-information-network-services-ensure-connections-to-the-world-through-nordic-countries">Read more about DNA's telecommunications connections from the Nordic region to the world!</a></strong></p>Mariela Pulkkanen2024-03-12T06:30:00ZHow to prevent SMS scammers from impersonating your business?Mariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=174254172024-02-29T05:50:46Z2024-02-29T04:00:00Z<p class="ds-lead-paragraph">Customers reach out to you about strange text messages they have received from your company. After investigating the matter it turns out that thousands of scam SMS messages have been sent in your company's name. </p> <p>Too many companies and organisations have been in this situation. At worst, SMS scams can lead to your customers losing a lot of money or having their personal data leaked. Every scam campaign inevitably also damages the reputation and reliability of the targeted company. Therefore, companies should do all they can to prevent scams. </p> <p>By spoofing the text message sender information, criminals have been able to make their scam messages appear in a familiar SMS message chain, where other messages are genuine customer messages from the company. This increases the risk that the customer clicks on a phishing link in the message. DNA and other Finnish telecommunications operators have, together with Traficom, now created an effective solution to this headache: SMS Sender ID protection. </p> <p>The SMS Sender ID is the name that appears on the recipient's phone screen as the sender of the text message. Companies can now register their own business name as an SMS Sender ID with Traficom and thus reserve it only for themselves. Once registered, any other party will no longer be able to send text messages in Finland with the same ID – and will therefore not be able to include scam messages to the company's real message chains. Finnish operators are responsible for the technical implementation of traffic blocking, which requires them to actively maintain and monitor the service. </p> <h2 class="h3">I want to protect my SMS Sender ID – what to do? </h2> <p>You can register your SMS Sender ID by filling out <a href="https://www.traficom.fi/en/communications/broadband-and-telephone/sms-sender-id" target="_blank">the form on the Traficom website</a>. In practice, however, the registration blocks all messages in Finland using that specific ID. If you still want to – and most likely you do – send messages to your customers or other stakeholders after the registration, you must enter into an agreement with the partner(s) you use for sending the messages, such as a telecommunications operator. The agreement must be in force and implemented within three months from Traficom's registration decision. </p> <p>DNA can deliver messages sent from your registered SMS Sender ID to all Finnish mobile phone numbers. To do this, you will need to add DNA SMS Sender ID as a supplementary service to <a href="https://www.dna.fi/dnabusiness/customer-service-solutions/group-sms-messages">DNA Message</a> or <a href="https://www.dna.fi/wholesale/messaging/a2p-messaging">DNA SMS Gateway A2P</a>. It allows you to use the registered ID and continue to reach your customers via SMS – more secure than ever.</p> <p> </p> <p><strong><a href="https://www.dna.fi/dnabusiness/customer-service-solutions/group-sms-messages">Read more about DNA SMS Sender ID service</a> and prevent SMS scammers from impersonating your business. </strong></p>Mariela Pulkkanen2024-02-29T04:00:00ZEdge Computing, Private Networks and Autonomous Drones – How Modern Technology Can Secure Your Business?Mariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=172311972024-02-14T06:19:11Z2024-02-12T04:30:00Z<p class="ds-lead-paragraph">In a joint demo event by DNA, AWS and Unmanned Life, we got to explore practical examples of the opportunities current technology offers both for boosting and securing business. How do edge computing, private networks and autonomous drones relate to each other? </p> <p>At this very moment, it’s likely that several autonomous drones circle over the port of Antwerp, monitoring the 120 square kilometre area. The drones take care of tasks such as infrastructure inspection, surveillance, tracking, managing hazardous situations, overseeing the docks, and detecting oil spills or drifts. The goal is to have a network of autonomous drones that can provide up-to-date snapshots of the different activities in the port. </p> <p>According to the Port of Antwerp, the use of drones will play an increasingly important role in the future – but what other uses can autonomous drones have? And what is the technology that enables all of this? </p> <h2 class="h3">Security and Efficiency from Drones and Private Networks </h2> <p>Autonomous drones have been proven to be useful not only in port areas, but in other industries as well, such as logistics, construction, healthcare, and transportation. And in addition to drones, also various task-performing robots have demonstrated their worth. </p> <p>However, nether drones nor robots are able to perform on their own. They need functional connections and platforms through which they can be controlled. </p> <p>In terms of connections, private mobile networks are excellent for industrial use. They make it possible to build your own private network on top of the public 4G network. In the future, you can also use the 5G network, which ensures that no other load is straining the network. Private networks are particularly beneficial for factories, healthcare equipment and autonomous vehicles, which have high requirements for transfer speed and latency. </p> <p>"In a private network we can guarantee the capacity and availability the services require," explains <strong>Ville Kantola</strong>, who is responsible for DNA's private network services. </p> <p><a href="https://www.dna.fi/dnabusiness/network-solutions/private-network">DNA Private Network</a> is suitable for environments that require high-quality connections and guaranteed capacity with low latency. Private networks can use edge computing, allowing data to be managed locally and used more quickly. </p> <h2 class="h3">Hybrid Edge Offers Low Latency and Local Data </h2> <p>The hybrid edge combines the features of an edge network and a cloud network, offering users and applications a fast and flexible way to access computing and storage resources. Hybrid edge allows computing power to be moved closer to users and devices, reducing latency and improving performance, especially in intelligent IoT solutions. For such more demanding solutions, additional performance is available from DNA partners, such as AWS, which provides a world-class cloud computing platform. </p> <p>"With DNA's cloud-based architecture, necessary and important functions can be distributed and enhanced with edge computing, whether it's a regional or smaller private network," Kantola explains. </p> <p>Cloud-based architecture can help optimise resource utilisation and make operations less dependent on remote cloud servers. This can be useful, for example, in cases where there is a need to minimise the amount of data traffic or comply with certain data protection regulations. </p> <h2 class="h3">The Platform Behind Drones and Robots Management </h2> <p>The <a href="https://unmanned.life/" target="_blank">Unmanned Life</a> platform used for drone and robot management is designed to enable mass control of drones in complex environments, such as cities, industrial areas and logistics centres. </p> <p>Unmanned Life's distributed software-based system utilises artificial intelligence, machine learning and real-time information about drone movements, and it analyses the operating environment. This enables efficient optimisation of drone paths, obstacle detection and avoidance, and real-time decision making to improve operational efficiency. Single platform management makes drone operations safe, productive and cost-effective, and helps minimise risks. </p> <p>But what are the business benefits of edge computing, private networks and autonomous drones? </p> <p>"Leveraging new technologies is critical to business resilience and continuity today. Automation and secure networks are key in this. The best way to cope with change is to utilise partners with the best expertise," summarises <strong>Dominique Akl</strong>, Vice President of DNA’s network and cloud solutions. </p> <p> </p> <p><strong>Would you like to hear more about the technology that enables the use of drones to support and secure your business? <a href="https://www.dna.fi/dnabusiness/contact-us">Contact us! </a></strong></p>Mariela Pulkkanen2024-02-12T04:30:00ZDecision maker: Give your customers reasons to trust in digitalizationMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=170628122024-01-30T11:45:07Z2024-01-29T09:00:00Z<p class="ds-lead-paragraph">Digitalization is an answer to many of those challenges we will face as a society. It can ensure a company's responsible development by alleviating the labor force shortage and eliminating unnecessary travel in our country of long distances. Finland is still one of the leading countries in digitalization.* We can be proud of many things, but we also have work to do regarding digitalization. Business leaders play a key role in helping digitalization to succeed. </p> <p>People need to trust digital services, and they need to want to use them so that digitalization has a chance to succeed, say DNA's SVP of Corporate Business, <strong>Anna-Mari Ylihurula</strong>, and the Director General of the Digital and Population Data Services Agency, <strong>Janne Viskari</strong>. </p> <p>“Customer’s trust is won with strong competence. You need to know how to serve customers and keep their information secure. People already have a lot of experience with very good international online stores, and online scams worry many, so the bar is high,” says Viskari. </p> <p>The latest <a href="https://dvv.fi/documents/16079645/141915645/Digital+Skills+Report+2023.pdf/f6915475-92e2-c7a2-2228-d6cae99d2f3c/Digital+Skills+Report+2023.pdf?t=1705916923267" target="_blank">Digital Skills Report</a> of the Digital and Population Data Services Agency shows that Finnish companies are doing well in international comparison when assessing their performance level in cyber security, data security, and data protection. Ylihurula, however, sees room for improvement. She challenges technology companies to learn to use the same wavelength with customers. </p> <p>"In our industry, the companies have much to learn about speaking the same language with the customer. We still ask the customer for technical details even if the customer should be helped by asking him familiar things. As service providers, it is crucial for us, as industry experts, to be able to recommend and provide user-friendly and high-quality technical solutions that are appropriately validated." </p> <p><img alt="" class="dna-cld-responsive dna-cld-responsive--full placeholder" data-blur-src="https://res.cloudinary.com/dnaoyj/image/upload/c_scale,dpr_auto,e_blur:100,f_auto,q_1,w_300/v1/Assets/YLT/Uusi%20ty%C3%B6/Artikkelit/Anna_Mari_Ylihurula" data-src="https://res.cloudinary.com/dnaoyj/image/upload/c_scale,dpr_auto,f_auto,q_auto,w_auto/v1/Assets/YLT/Uusi%20ty%C3%B6/Artikkelit/Anna_Mari_Ylihurula" loading="lazy" src="https://res.cloudinary.com/dnaoyj/image/upload/c_scale,dpr_auto,e_blur:100,f_auto,q_1,w_300/v1/Assets/YLT/Uusi%20ty%C3%B6/Artikkelit/Anna_Mari_Ylihurula" /></p> <h2 class="h3">Business leaders as key players in digitalization </h2> <p>Business decision-makers have a key role in promoting digitalization. They need to understand the importance of good online services and enable their development, for example, by providing sufficient resources. Understanding the importance of cyber security is also essential for everyone in the industry. </p> <p>"Every successful and untreated data breach takes away people's trust in digitalization. Those breaches that can be prevented must be prevented, and mistakes like leaving default passwords on the network, unfortunately, have been seen recently, cannot happen," Viskari emphasizes. </p> <p>“Exactly: a lot can be achieved by taking care of the basics. However, cybercrime is a vast industry, and we might have to see attacks that are not prevented by not making basic mistakes. Cybersecurity, like all aspects of continuity management, requires careful planning. What is done when something inevitably happens? How do we ensure business continuity, and what recovery plans are effective in different scenarios?” Ylihurula states. </p> <h2 class="h3">Service provider: Consider data security in layers, like an onion </h2> <p>Ylihurula and Viskari talk about the layering of data security. This means that data security is taken care of at every organizational level and in all of the company’s operations. </p> <p>"Own network must be secured, and the operations of partners with interfaces to our network or data must also be secure. Have they been ensured sufficiently, for example, through competent audits? Even our internal systems must be secured so that the attacker is halted at the latest when attempting to breach the company's network," says Ylihurula. </p> <p>"We have witnessed unfortunate cases where an attacker stealing invaluable information didn't have to be a formidable cyber expert. Theft becomes easy if a criminal simply walks in through an open door. Each such case severely damages trust in all digital services. On the other hand, in the digital world, preventing all threats in advance is impossible. In addition to technical preparedness, planning and practicing for different scenarios are necessary. This way, the response is quick, and the consequences can be contained if an attack occurs," notes Viskari. </p> <p>Management should take care of the competence of their staff as much as the protection of various production layers. </p> <p>"Digital business can continue only as long as the company has the trust of its customers. Understanding cybersecurity and data protection requirements must be the staff's core competence. This is an important socially responsible act and a basic requirement of the modern era." </p> <h2 class="h3">And what digital preparations still need to be done? </h2> <p>Everyday life is busy, and planning digital continuity might have yet to reach the top of the to-do list. However, everything is preserved if important data is still safe. You can get off to a good start in improving your digital security with the following tips: </p> <ul> <li>First, consider what is most important to you, your family, and your business. Then, contact your service provider, asking for advice. Service providers have checklists on how to ensure one's digital security. For a company, the core issue may be keeping the online store operational. For a private individual, the most important thing might be keeping online banking credentials and health information confidential. </li> <li>If you have a computer, domain name, or a work phone, it is highly recommended to keep them separated from the accounts, devices, and services you use in your private life. At the very least, the passwords must be unique in each service. </li> <li>Remember device security. What device do you use to access digital services? For many, it’s a smartphone. Contact your service provider and ask for a checklist to ensure its security level. </li> </ul> <h2 class="h3">The latest Digital skills report examines digitalization and digital skills </h2> <p>The Digital and Population Data Services Agency published the latest <a href="https://dvv.fi/documents/16079645/141915645/Digital+Skills+Report+2023.pdf/f6915475-92e2-c7a2-2228-d6cae99d2f3c/Digital+Skills+Report+2023.pdf?t=1705916923267" target="_blank">Digital skills report</a> on 15.12.2023. It examines the general digitalization of society, businesses, other organizations, and individual digital skills. In 2023, the report's theme revolved around the importance of digitalization: digital-first, but not alone. The report specifically focuses on experiences related to digitization and digital competence. The report provides an overview of the state of Finnish digital skills and the types of digital support needs among the Finnish population. </p> <p> </p> <p> </p> <p><strong>Read also: <a href="https://www.dna.fi/dnabusiness/blogi/-/blogs/10-essential-tips-to-strengthen-your-companys-cyber-resilience">10 essential tips to strengthen your company’s cyber resilience </a></strong> </p> <p><span style="font-size:14px;">*) <a href="https://digital-strategy.ec.europa.eu/en/policies/desi" target="_blank">https://digital-strategy.ec.europa.eu/en/policies/desi </a></span><a href="https://digital-strategy.ec.europa.eu/en/policies/desi" target="_blank"> </a></p>Mariela Pulkkanen2024-01-29T09:00:00ZFiltering threats is one of the most important tasks for operators – Telenor blocked more than 250 million scam calls globallyMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=170552802024-01-30T06:38:05Z2024-01-26T05:00:00Z<p class="ds-lead-paragraph">Finland is targeted by many different scam attempts, even as we speak. In particular, SMS and phone scams have become more common. Still, at the same time, operators are constantly working actively to keep their networks secure. </p> <p>DNA is part of Nordic Telenor, one of the world's leading operators. In 2023, the conglomerate blocked as many as <strong>250 million spoofed calls</strong> globally. In Finland, DNA blocks more than 700,000 scam calls per month on its network. However, the number of scam calls varies; for example, more than<strong> 2.6 million were blocked last October</strong>. Active prevention is needed as criminals are becoming more and more sophisticated in their scams. During last year, <a href="https://corporate.dna.fi/tietoturvataito">DNA succesfully blocked more than 10 million scam calls and over one million scam SMS messages</a>. </p> <p>"One of the most important roles of an operator is to provide security for their customers and prevent threats. Together with other operators and Traficom, we seek ways to filter out new scams. In addition, Traficom's regulations will guide and harmonise operators' activities," says <strong>Ilkka Tuominen</strong>, Fraud Manager at DNA. </p> <p>Telenor has solutions that help DNA to identify and stop unwanted traffic on our networks in near real-time. Once a sequence of numbers is identified as a scam, it is blocked in seconds. </p> <p>Our own networks and monitored services bring security to DNA's consumer and business customers globally, as Telenor controls the connections and roaming partners with its own agreements and technologies. Telenor's hundreds of own roaming contracts also bring volume and scalability benefits to DNA's customers. </p> <p>In addition to the current filtering rules, based on Traficom’s recent regulations, SMS traffic will be filtered more effectively from the beginning of 2024. </p> <p>"As a responsible operator, DNA wants to help its customers stay safe. Not all scam attempts can be prevented yet, so everyone should remain vigilant and take care of their own cyber security," Tuominen continues. </p> <h2 class="h3">Businesses are also targeted – how to ensure safety </h2> <p>Criminals are constantly inventing new scams with which they try to collect, for example, passwords, payment card details or online banking credentials, for example. Also, snooping of disposable codes used in two-factor authentication has become more common. In addition to individuals, businesses and their employees are often targeted. </p> <p>Corporate scams often impersonate the CEO, a colleague, or IT support. The aim is to gain access to the company's systems, for example, by tricking an individual employee. Both the scam messages and the fake web pages they contain often look almost real at first glance, and the scammers try to create a sense of urgency so that the target does not think to check the details. </p> <p>Phone scammers may, for example, pose as a representative of your bank with worrying news about the state of your bank account. The scammer may want to send you additional written instructions or a login link, which allows the scammer to progress towards their goal: stealing your bank details. The scammer is always one step ahead: when you think you are authenticating yourself to the service with your banking credentials, the scammer uses them simultaneously to access your bank account. </p> <p>The current situation has led to frequent alerts about scam messages in the name of various organissations. Scammers also send targeted fake scam warnings to make the recipient react before thinking twice. In these situations, the scammer tries to appeal to the recipient's emotions in order to provoke an impulsive, emotional response, often successfully. The recipient of the message will click on the link before they have looked at the message in more detail. Even in these situations, one should remain calm. If something unauthorised happens in banking, always contact your bank first. </p> <blockquote> <p>A basic security measure is to be aware that your operator, bank, and other service providers are not contacting you to ask for your IDs or passwords. </p> </blockquote> <p>In addition, a good rule of thumb is to check the sender’s origin before clicking any links. If a colleague makes a strange request or bypasses an agreed process, be suspicious and call them to confirm. </p> <p>Companies should train their employees to protect themselves from cyber threats and actively inform them about current scams. In the era of remote work, establishing rules on which devices and connections can access the company network is also a good idea. A separate guest network should be created for visitors. Especially during the summer season, scam invoices are sent to companies in the hope that they will pass through the screen of fill-in employees. It is a good practice to inform employees regularly about these scams as well. </p> <h2 class="h3">Discuss security also with your family </h2> <p>Family members are also being exploited more often these days. The scams include text messages pretending to be the caller's child, telling them their phone has broken and they have a new number. </p> <p>For example, if a loved one informs you of a change of number, you should put your phone down for a moment and take a breath before initiating action. A good next step is to call the close relative's "old" number – the one you already have in your contacts. If the number rings, the connection hasn't changed, and the sender is an imposter. </p> <p>Easy and simple passwords should be replaced by harder-to-guess ones, and the same password should not be used for more than one service. Two-factor authentication helps prevent criminals from accessing your accounts. Do not give a one-time authentication code to anyone unless you have ordered one yourself to log in to the service you are using.</p> <p> </p> <p><strong>Improve your business security and avoid phishing – See our comprehensive <a href="https://www.dna.fi/dnabusiness/data-security">data security services</a>! </strong></p>Mariela Pulkkanen2024-01-26T05:00:00ZDNA's new SVP, Corporate Business: "Planning is good, combined with action even better"Mariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=169500372024-01-19T11:29:15Z2024-01-15T10:00:00Z<p class="ds-lead-paragraph"><strong>Anna-Mari Ylihurula</strong> assumed the role of SVP, Corporate Business at DNA in early August 2023. Her first hundred days in office included a deep dive into the operations of Telenor, one of the world's largest operators. The global reach of Finnish telecommunications operators is exceptionally strong.</p> <p>To Ylihurula, who has extensive experience in leadership roles in the operator field, DNA’s profile was that of a bold challenger characterized by customer-centric and employee-friendly practices. With growth exceeding the market’s pace, however, DNA is no longer just a challenger but the <a href="https://corporate.dna.fi/press-releases?type=stt1&id=69977012&scrollTo=UJpEOgFgPw1f&status=all&returnUrl=https%3A%2F%2Fcorporate.dna.fi%2Fpress-releases%3FscrollTo%3DUJpEOgFgPw1f">second-largest player</a> in the mobile market. Via parent company Telenor, DNA is part of one of the world's largest operators.</p> <p>"Telenor’s capabilities are unique in the Finnish operator market. Telenor is significantly larger than other operators active in Finland, and this scope opens up significant advantages and opportunities for us and our customers," explains Anna-Mari Ylihurula.</p> <h2 class="h3">Experience is crucial in critical security environments </h2> <p>The close connection between DNA and Telenor is exemplified by joint research and development, competence centers operating in key strategic areas, and global procurement enhancing operative efficiency. Joint product development targets specifically selected areas, such as software-defined networks, cybersecurity, and mobile private networks. </p> <p>"The overwhelming market position of the 168-year-old Telenor is evident in the company’s home country, a founding nation of NATO. Telenor has a strong role and seminal experience in designing and building telecommunications services in critical security environments," notes Ylihurula. </p> <p>The breadth of Telenor's scope is particularly noticeable in network coverage. In addition to mobile networks in the Nordic region, Telenor has nearly 200 000 kilometers of its own fixed fiber network, including several alternate land and sea routes. Satellite connections can be utilized to secure additional backup routes for highest-priority telecommunication needs, such as ensuring patient data access for hospitals in extreme situations. </p> <p>The global roaming agreements negotiated by Telenor also yield significant benefits to DNA's customers. Large volumes enable early adoption of new services, such as next-generation network solutions or higher-quality voice services. In addition, volumes yield cost benefits. </p> <h2 class="h3">Skills requirements are growing </h2> <p>Quintessential to Ylihurula's thinking is the outside-in principle. In practice, this means that internal development within an organization is pointless without customer input. </p> <p>"During these first few months I’ve met with many DNA customers and asked them to provide their views on how we’ve succeeded in serving them. Their positive feedback has reinforced my notion that customer-centricity is a key strength of DNA," says Ylihurula. </p> <p>According to a recent <a href="https://corporate.dna.fi/lehdistotiedotteet?type=stt2&id=70038690&scrollTo=UJpEOgFgPw1f&status=all&returnUrl=https%3A%2F%2Fcorporate.dna.fi%2Flehdistotiedotteet%3FscrollTo%3DUJpEOgFgPw1f">EPSI Rating study</a>, DNA is the top-rated mobile operator in customer satisfaction for both business and private customers. Another <a href="https://corporate.dna.fi/lehdistotiedotteet?type=stt2&id=70045510&scrollTo=UJpEOgFgPw1f&status=all&returnUrl=https%3A%2F%2Fcorporate.dna.fi%2Flehdistotiedotteet%3FscrollTo%3DUJpEOgFgPw1f">recent study</a> found that Finns consider DNA the most responsible company in its industry. </p> <p>Skill requirements are constantly growing in the field of telecommunications. It is important to understand both telecommunications and information technology, as themes such as cloud connectivity, artificial intelligence, and cybersecurity are present in practically all discussions with customers and partners. </p> <p>"I think it's important that we have a clear understanding of how the industry is developing, what technologies are emerging, and what we are able to offer our customers. My goal is for DNA to combine the best practices from around the world and imbue it with pride in the expertise we can provide on a global scale. This affords us the humility to learn new things and refine our understanding to reach greater heights than before," outlines Ylihurula. </p> <h2 class="h3">Planning is important, but execution is paramount </h2> <p>Ylihurula exudes a hunger for learning new things. A sense of determination echoes in her words, and many new wheels have already been set into motion in the first few months. </p> <p>"I have worked in various leadership positions for a long time and have become accustomed to a mindset that everything can be built from scratch if need be. At DNA, for the first time I have found myself in a situation where it is possible to see the best practices of a global organization from the inside. It's truly rewarding to utilize them in the planning and management of high-quality and efficient operations," notes Ylihurula. </p> <p>The ability to understand customers' business needs and required use cases is essential. Telecommunication services are a critical link in the chain in practically all organizations, and proactive guidance must be a core competence of an operator. Choices need to address not only everyday needs but also potentially heightened requirements. A solid piece of advice is that simple services cannot be implemented into complex environments. </p> <p>"The highest success rates are achieved collaboratively, and positive tension can provide solutions to seemingly impossible tasks. A key principle for me is that action is essential: planning is important, but high-quality execution is paramount," emphasizes Ylihurula. </p> <p> </p> <p><strong>Since DNA became a part of the Norwegian Telenor Group, Nordic and global collaboration in connectivity has strengthened further. <a href="https://www.dna.fi/dnabusiness/blogi/-/blogs/dna-s-information-network-services-ensure-connections-to-the-world-through-nordic-countries">Read more about DNA's telecommunications connections from the Nordic region to the world! </a></strong></p>Mariela Pulkkanen2024-01-15T10:00:00ZThe tech trends of 2024: Science, cybersecurity security and a more sustainable futureMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=164531872023-12-14T05:00:14Z2023-12-14T05:00:00Z<p class="ds-lead-paragraph">The technology trends of 2023 were dominated by artificial intelligence, but what will the year 2024 bring? As usual, DNA gathered next year's technology trends into one list. This year, too, the Technology Trend Report offers views of experts in various fields and, of course, predictions about the technologies that will define our future.</p> <p>DNA's Technology Trend Report 2024 consists of four thought-provoking expert interviews and 14 future trends. What is smart dust? And what is happening in the field of cybersecurity? </p> <p>In this article, we present five trends from the report. You can read the rest by downloading the free <a href="https://www.dna.fi/dnabusiness/technology-trends-2024">Tech Trends 2024 report</a>. </p> <h2 class="h3">Dust-size particles transform data collection </h2> <p>Intelligent dust, intellidust, smart dust... A technological concept known by many names. Smart dust is based on tiny, independent microelectronic devices that function as data collectors with different sensors. Essentially, smart dust is a conglomeration of multiple individual devices, some as small as a fraction of a millimeter in diameter. </p> <p> </p> <p>The concept of smart dust may sound wildly futuristic, but the term was coined in 1992 by a think-tank at the RAND Corporation. Smart dust can detect variations in a specific environment's light, temperature, vibration, or chemical composition. The data collected by the particles can then be transmitted to the cloud for extensive analysis. </p> <p>As each smart dust particle operates independently, they require a power source. In 2022, researchers at the University of Washington introduced feather-light wireless sensors that operate on solar energy. Such breakthroughs mean that the propagation of smart dust to areas such as scientific research and defense may take place faster than we think. </p> <p>Researchers and technology professionals are engaged in a race of speculation about the breakthroughs we may encounter as networks formed by billions of microscopic sensors become a part of our daily lives. </p> <h2 class="h3">The world's first digital nation </h2> <p>In April 2019, a significant part of the Notre-Dame Cathedral in Paris was destroyed by a fire. The demanding restoration project was offered a surprising helping hand from an unlikely source. The video game company Ubisoft had extensively studied Notre-Dame for nearly 5,000 hours for their video game, which takes place in Paris. Precise 3D blueprints were provided to the French government to facilitate the reconstruction efforts. </p> <p>Now, another nation has harnessed digitalization to rebuild under dramatic circumstances: the island nation of Tuvalu is the world's first country transitioning to the metaverse. Due to climate change, Tuvalu's land mass comprising nine atolls will disappear beneath the waves in just a few decades. At the same time, this small country's history, culture, and oral traditions risk disappearing into the depths of the sea. </p> <p>Tuvalu's government has chosen an exceptionally modern solution: all of Tuvalu's traditional knowledge, from the islands' ecology to the achievements of Tuvaluan sports teams, is gradually being transferred into the metaverse. By creating a digital representation of their state, Tuvalu is leaving behind a unique digital footprint, ensuring the preservation of their history for future generations. Hopefully, the nation's fate will also leave its mark on the present, serving as a reminder of the grievous impact of climate change. </p> <h2 class="h3">NIS2 directive tightens cybersecurity requirements </h2> <p>The European Union introduced the first version of cybersecurity regulations in 2016. The purpose of the NIS directive was to centralize cybersecurity requirements for operators in the digital realm and socially critical sectors. However, digital threats have increased significantly, so the original directive is updated to NIS2. </p> <p>The European Parliament ratified the revised NIS2 directive in November 2022, and will be incorporated into Finnish legislation in October 2024 at the latest. The NIS2 directive will entail even tighter collaboration between companies and national entities to prevent cyberattacks. </p> <p>The directive applies to various sectors, including the energy industry, finance, healthcare, and public services, as well as a wide range of entities in the digital world. The NIS2 represents a significant and comprehensive effort to equip businesses and key societal organizations with the most efficient tools to prevent modern digital threats from materializing into corporeal form. </p> <p>Business decision-makers need to become acquainted with the NIS2 directive well in advance. In Finland, inquiries related to NIS2 should be directed to the Finnish Transport and Communications Agency's Cyber Security Center (Traficom). This applies to all sectors apart from the financial industry – finance sector operatives will receive NIS2 assistance from the Finnish Financial Supervisory Authority (Finanssivalvonta). </p> <h2 class="h3">Advances in quantum computing demand a security overhaul </h2> <p>One downside of the rapidly advancing field of quantum technology is that quantum computers may be used as part of cyberattacks in the future. As the capabilities of quantum computers grow, it is theoretically possible to use them to breach commonly used encryption algorithms such as RSA and ECC cryptography. Digital signatures for data and currency transfers are also at risk. The potential downfall of old encryption algorithms could provide clandestine operators with, say, open access to a company's or organization's bank accounts and data vaults. </p> <p>Since this scenario could potentially threaten substantial societal structures, preparations are made at governmental levels. In the United States, options for quantum-resistant encryption algorithms are explored extensively, and Finland's Defense Research Institute is also closely monitoring the development of quantum-secure encryption. Experts in the field unanimously agree that the capabilities of quantum computers will soon reach a level where their malevolent use poses a significant global threat. </p> <p>Implementing quantum-secure solutions will eventually be part and parcel of numerous businesses. It is high time to begin monitoring the development of quantum technology as part of a company's cybersecurity procedures. Sooner or later, implementing quantum-resistant encryption algorithms into existing systems will become necessary. </p> <h2 class="h3">Emission-free fusion energy soon a reality? </h2> <p>The global demand for primary energy continues to rise steadily. Due to the limited nature of fossil fuels and the environmental issues they pose, experts are urgently seeking new alternatives to conventional energy sources. </p> <p>A significant energy sector breakthrough was recently achieved in the United States. Researchers managed to create a fusion reaction that produced more energy than it consumed for self-sustaining operation. Although the experiment generated only a tiny amount of power, the crucial aspect was the consumption ratio: the fusion reaction produced more energy than it used. This, in and of itself, is a monumental achievement that has been sought after for decades. </p> <p>Concurrently, the ITER reactor is being constructed on the Old Continent in Provence, Southern France. Nearly half of the world's nations are involved in the project, which is expected to be completed in 2027. The goal is for ITER to begin producing fusion energy by 2050. </p> <p>Understandably, researchers are excited about the recent breakthroughs in fusion energy, as they are essential steps towards a global jackpot. Fusion reaction does not produce greenhouse gas emissions or radioactive waste, making it nearly emission-free. Fusion energy would also be significantly safe to use because, unlike traditional fission-based nuclear reactors, a fusion power plant cannot trigger a nuclear catastrophe. Fusion fuel would also provide a renewable, nearly inexhaustible energy resource not reliant on fossil fuels. It is truly the cocktail of a brighter future. </p> <p> </p> <p><strong>Would you like to take a look to the future? <a href="https://www.dna.fi/dnabusiness/technology-trends-2024">Download the entire Technology Trend Report here! </a></strong></p>Mariela Pulkkanen2023-12-14T05:00:00Z"The juxtaposition between fusion and fission is pointless" – Europe is at the forefront of fusion energy researchMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=164484062023-12-14T05:00:15Z2023-12-14T05:00:00Z<p class="ds-lead-paragraph">A fusion reaction is a nuclear reaction where two light atomic nuclei combine to form one heavier nucleus. Hold on – if fusion energy is also nuclear energy, why are more positive conceptions associated with it? And how does it differ from the more familiar fission reaction? And why are breakthroughs in fusion energy followed like the rising moon? </p> <p>"If the word fusion energy sounds difficult, it can be understood through a more familiar concept of company merger, where two companies consolidate. In a fusion reaction, two separate particles are combined into one, simultaneously releasing energy," explains <strong>Tuomas Tala</strong>, VTT's leading researcher and research professor of fusion technology. </p> <p>Fusion energy speaks volumes, and no wonder: the fusion reaction does not produce any high-level waste, unlike the fission reaction. Fission energy, the thing that we traditionally think of as nuclear power, on the other hand, leaves behind radioactive waste. The preservation of atomic fuels has sparked a lively debate for decades, which is why the safety of fusion energy attracts interest. </p> <p>Fusion energy offers another undeniable advantage in addition to cleaner energy. </p> <p>"Fusion reactors are safer because there are only about kilograms of fusion fuel in the reactor. In a fission reactor, the amount of fuel reaches hundreds of tons. In a fusion reactor, an accident affecting the surrounding environment, or its people simply cannot happen," Tala describes. </p> <h2 class="h3">From zero to net positive </h2> <p>If fusion energy is so safe compared to fission energy, why do we still have nuclear plants based on fission? </p> <p>"Fusion energy is emission-free because it does not generate greenhouse emissions or high-level waste. Of course, helium is produced as a byproduct of fusion, which is not dangerous for the environment. However, low-level metal-based nuclear waste is generated in a fusion reactor at least as much as in a fission reactor," explains Tala. </p> <p>Another, more significant reason for the established position of fission power plants is energy production: In 2022, for the first time ever, the fusion reaction was able to produce more energy than was required for its maintenance. This is called a net positive fusion reaction. The amount of energy produced by two weeks of successful experiments could have boiled about ten liters of water, reported Finnish magazine <a href="https://tekniikanmaailma.fi/fuusioenergialla-saavutettiin-ensimmaista-kertaa-nettopositiivinen-sahkon-tuotanto-historiallinen-hetki/" target="_blank">Tekniikan Maailma</a> last year. </p> <p>Although the result may sound unsuccessful, it is very significant. It has been proven that fusion energy can also work in practice and not just on a theoretical level. According to Tala, this has been reflected in the interest in fusion energy research - and perhaps in funding. </p> <p>"In the 1970s, fusion energy was the subject of enthusiasm, and at that time, it was thought that the success of fusion was only a matter of time. In the 90s, it was realized that this would take some time, and at the beginning of the 2000s, research progressed slowly. After 2020, progress was made, and enthusiasm for the issue started to rise again. And now, with recent successes, it has been easier to get projects funded in Finland as well." </p> <h2 class="h3">The field of fusion needs more engineers </h2> <p>Tala chose nuclear energy at the Technical University over three other possible fields of study. In the same year, Finland joined the European Union, and thus, it became possible to participate in the fusion studies of the European Atomic Energy Community, Euratom. </p> <p>Right now, Europe is at the forefront of fusion research. According to Tala, research can, and does, live well in Finland because nuclear energy is viewed more positively than in many other countries. In the future, artificial intelligence will aid scientists in analyzing fusion data, and quantum computers will run the calculations. </p> <p>There are enough students in the field of fusion energy, especially in science. But fusion plants also require a considerable amount of engineering expertise to study materials technology and the construction of various devices. These fields are less crowded, so there is plenty to do in the future as well. </p> <p>Finally, Tala wants to emphasize one more thing: </p> <p>"The juxtaposition between fusion energy and fission energy is completely pointless. It is obvious that if the choice could be made, everyone would choose fusion. But fission is currently capable of producing energy economically, and fusion is still a long way off."</p> <p> </p> <p><strong>Are you excited to hear more about future trends? <a href="https://www.dna.fi/dnabusiness/technology-trends-2024">Download DNA's Technology Trend Report 2024! </a></strong></p>Mariela Pulkkanen2023-12-14T05:00:00ZEnergy, accessibility, and safety: technology leads towards sustainable digitalizationMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=164483592023-12-14T05:00:16Z2023-12-14T05:00:00Z<p class="ds-lead-paragraph">From the perspective of sustainability, technology has two sides. On the one hand, technology opens ways to solve humanity's most challenging problems. On the other hand, the technology industry consumes a significant amount of energy and other natural resources.</p> <p>Digital is here to stay, and it inevitably consumes energy. Therefore, sustainable operators must think carefully about energy use and energy resources. For example, replacing 3G networks with clearly more energy-efficient 5G networks is an act of responsibility. The amount of transferred data increases, but the energy requirement per data bit decreases. The origin of electricity also matters. All electricity purchased directly by DNA is renewable, and starting in 2025, more than 80 percent of the electricity will come from <a href="https://corporate.dna.fi/press-releases?type=stt1&id=69997046&scrollTo=UJpEOgFgPw1f&status=all&returnUrl=https%3A%2F%2Fcorporate.dna.fi%2Fpress-releases%3FscrollTo%3DUJpEOgFgPw1f">Finnish wind farms</a>.</p> <h2 class="h3">Digital accessibility enables participation</h2> <p>"Sustainability is too often thought of only in terms of environmental issues. In addition, company management must consider various issues related to social responsibility and good governance. One theme close to us as an operator is digital responsibility. We feel that in a digitalizing society, we are responsible for keeping people and organizations involved and safe," says <strong>Anna-Mari Ylihurula</strong>, DNA's SVP, Corporate Business. </p> <p>A key part of the operators’ sustainability in the telecommunications and technology sector is ensuring that the accessibility, usability, and security of digital services are at a high level. </p> <p>"We must ensure that digitalization offers our customers more advantages than threats, and an important part of sustainable digitalization is security. Service processes anticipating threats and concrete customer solutions are particularly important. Such are, for example, network and service management services that automatically scan network traffic, distinguishing good traffic from bad. A concrete example is DNA Selausturva, which prevents the user from accidentally ending up on harmful websites," advises Ylihurula. </p> <p>Digital responsibility also includes managing the way people speak about digital content. The specific vocabulary used in the technology industry can make it difficult for decision-makers, for example, to understand why certain costs are rising and what requires attention. </p> <p>"You have to recognize the effects of the jargon prevailing in the field. Jargon is an easy hide when you don’t understand the value or benefit of the technology for the customer. At worst, discriminatory technology talk can lead the customers being asked to make overly complicated technical choices. Our task is to understand the operational needs of our customers and recommend the most suitable, sustainable solutions,” Ylihurula points out. </p> <h2 class="h3">Looking to the future is responsible management </h2> <p>Understanding, experimenting, developing, and utilizing new technologies is the core of future-proof business. Open-mindedness and innovation are important for companies and society's development and competitiveness. </p> <p>"Each manager must ensure that their understanding of future requirements is sufficient. Digital development and responsibility issues are changing the business environment so fundamentally that focusing only on meeting regulatory requirements is not enough. You must see the threats and opportunities, walk in the vanguard, and show the direction,” Anna-Mari Ylihurula emphasizes. </p> <p> In most organizations, separate digital strategies and digital leaders remain as short-term stopgaps. </p> <p>"Digitalization must be built into the organization's strategy. It is the company’s management’s task to understand what kind of technology exists, how it is used, and how it changes the business. Every manager should be interested in the changes in their business environment and the possibilities of technology. They should not outsource such a big topic only to a specific role,” says Ylihurula. </p> <p>In the telecoms and IT sector, issues such as directives on cybersecurity and responsibility reporting, and new legislation on the recycling of electronic equipment are now on the agenda. Each of these requires companies and organizations to take action to ensure business continuity and sustainability. The great thing is that most of them offer the opportunity to gain a new competitive advantage. </p> <p> </p> <p><strong>What does the technology year 2024 look like? <a href="https://www.dna.fi/dnabusiness/technology-trends-2024">Download the Technology Trends 2024 report</a>, which introduces the 14 most prominent trends. </strong></p>Mariela Pulkkanen2023-12-14T05:00:00ZBusinesses gear up for the quantum era – time to rethink encryptionMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=164479112023-12-14T05:00:16Z2023-12-14T05:00:00Z<p class="ds-lead-paragraph">Quantum computing has rapidly evolved over recent years, captivating the business community with its enormous potential for accelerated computational power. This burgeoning technology promises to revolutionize a myriad of sectors while also raising critical questions about preparedness for potential cybersecurity threats. </p> <p><strong>Juha Vartiainen</strong>, co-founder and Global Affairs Officer at IQM, Europe's preeminent quantum computing firm, is optimistic about the transformative potential of quantum technologies. Leading a team at the vanguard of quantum innovation, Vartiainen envisions quantum computers as complementary assets to existing computational frameworks. </p> <p>"Quantum computers shouldn't be viewed as replacements for classical computers, but rather as accelerators of computational prowess. They will soon be integral components in data centres, operating in conjunction with traditional computing systems," Vartiainen asserts. </p> <p>Although IQM's quantum systems are primarily deployed for educational and research purposes, the company foresees their commercial application in the near future. </p> <p>"Quantum computers are initially earmarked for academic and research applications, but it won't be long before they enter the commercial arena on a grand scale. Eventually, they could even be integrated into consumer services, accessible via mobile networks," he elaborates. </p> <h1 class="h3">Talent Shortage and Technological Barriers: Obstacles to Quantum Advancement </h1> <p>Despite its enormous potential, the trajectory toward widespread quantum adoption is fraught with challenges. One significant hurdle is the extensive infrastructure required for cooling quantum systems. Current setups necessitate massive cooling units, heavy-duty wiring, and robust electronics racks. Yet Vartiainen identifies an even more pressing impediment—talent scarcity. </p> <p>"There's a global shortage of highly trained quantum engineers, particularly those with Ph.D. qualifications. The fight for talent is intense, and it's a battle that transcends borders. Prioritizing talent acquisition and well-being of these experts is essential for progress in this field," he notes. </p> <p>To promote expertise in the quantum field, IQM has, among other things, launched the open-for-all 'IQM Academy' online course, through which anyone can receive free training on the subject. In addition, in collaboration with other stakeholders, it organizes hackathons and superconducting quantum computer and tailored learning experiences for universities and research labs worldwide. </p> <h2 class="h3">Promising experiments in various industries </h2> <p>Finland is among the global leaders in the quantum ecosystem, boasting numerous top-tier companies and research institutes. </p> <p>"While it's tempting to focus on the number of qubits, we should adopt a broader perspective. The U.S. might have a slight lead, with quantum firms already going public, and China is also a key player. However, the global landscape is hampered by the skills shortage. A concerted investment in university-level training is imperative for any country wishing to succeed in this domain," Vartiainen advises. </p> <p>Business sectors such as finance and automotive are already exploring the advantages of quantum computing. </p> <p>"In finance, quantum algorithms are being used for portfolio optimization. In the automotive industry, molecular simulations aid the development of enhanced battery materials. The hydrogen sector is also eyeing improvements in thin-film technologies," Vartiainen reveals. </p> <h2 class="h3">Preparing for the Post-Quantum Crypto </h2> <p>The advent of quantum computing also presents unique challenges to cybersecurity. The computational might of these machines could potentially shatter existing encryption algorithms. Conversely, quantum computing introduces unbreakable encryption techniques governed by the laws of physics, thereby enhancing data security. </p> <p>"While quantum computers don't yet pose an imminent threat to cybersecurity, it's crucial to stay ahead of the curve by examining the resilience of current encryption protocols," Vartiainen cautions. "For instance, the U.S. government is transitioning to quantum-resistant encryption next year. Organizations with heightened security requirements should consider similar upgrades." </p> <p>As the business world gradually awakens to the quantum age, preparation is key. </p> <p>"Business leaders sometimes say that they’d prefer a two-year cushion to get ready for the quantum revolution. Well, I'm throwing the cushion their way – It's time to roll up the sleeves and, at the very least, task someone in the organization with investigating the immense possibilities that quantum computing presents," Vartiainen concludes. </p> <p> </p> <p><strong>Curious about the technology trends set to shape 2024? <a href="https://www.dna.fi/dnabusiness/technology-trends-2024">Download the Technology Trends 2024 report</a>, which includes the 14 most significant trends. </strong></p>Mariela Pulkkanen2023-12-14T05:00:00ZTechnology complements human abilities – Neuroscientist says technological innovations are meant to enhance cooperationMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=164476872023-12-14T09:44:44Z2023-12-14T05:00:00Z<p class="ds-lead-paragraph">Smart clothes help people with speech difficulties, a smart watch analyzes our health, and a smart ring detects an intoxicating substance in a drink. Moreover, smartphones are ubiquitous in our pockets, and technological aids are integral to our daily work. Can we live without technology anymore, and do we even need to? </p> <p>"Different skills have been important at different times, but at each point in time, it has been important to know how to use the current technology," says neuroscientist <strong>Katri Saarikivi</strong>.</p> <p>Saarikivi is a cognitive neuroscience researcher in the field of cognitive neuroscience. Her research interests include learning, empathy, cooperation, and how these work in online environments.</p> <p>"The brain perspective is emphasized when technology penetrates so much into the thinking area. The use of technology aims to automate certain thought functions, which is a completely rational aim. Our innate abilities come second to a machine in many areas, such as memory accuracy and processing speed." </p> <h2 class="h3">What is the optimal relationship between technology and the human brain? </h2> <p>Today's people are utterly dependent on technology. We have complemented our abilities with various tools since the prehistoric axe. Our problem-solving ability grew exponentially when modern technology entered the picture. </p> <p>"Our living environment and we humans are glazed with technology. Clothes and for example glasses are early technology, buildings are technology, and various smart devices have appeared in our lives in recent decades. Our relationship with technology is optimal when it helps our species survive, solve problems, and improve. It does not depend on the quantity of technology, but on how we use it." </p> <p>The faster technology develops, the more it demands that we are optimistic about technology and eager to learn. If learning how to use a technological program or tool causes more distress than delight, it is called a technological burden. </p> <p>"It's an unnecessary burden if we have to learn how to use a new technology or device, but the tool causes more trouble than it is useful." </p> <h1 class="h3">The computer is not a mediator of empathy – Communication tools lag behind development </h1> <p>Interaction with a colleague can lead to brain synchronization at best. This, in common parlance, brain synch, can be seen in the electroencephalogram (EEG). It means that the brain works as if it were in the same rhythm: for example, the activity intensifies at the same time in specific frequency bands. </p> <p>"Brain synch predicts a better connection between people and performance in tasks that require cooperation," Saarikivi clarifies. </p> <p>Inter-brain synchronization, or brain synch, has been scientifically studied a little. However, we have been using the idiom "getting on the same wavelength" for a long time. It refers to when you don't have to guess the other person's thoughts, but you are of one mind. Or that there is no friction in the interaction, and things roll along without much thought. The best kind of interaction is one that requires only a little thinking. </p> <p>The enduring goal of technology is to enhance the efficiency of human activities. However, there ian urgent need for the development of communication tools. The quality of interaction is compromised as essential information is overlooked, due to technological shortcomings. </p> <p>"Current interaction technology can disrupt brain synchronization. Many people have already noticed that people talk over each other in a video call more than they would face-to-face. This is because even a small delay causes difficulties in taking turns and problems with syncopation. Deciphering body language is a game of milliseconds. I dream that in the future, technology will enable a better connection than face-to-face contact. Only then would the tool do what it ought to. Why should we be satisfied that the interaction tools do not support the mechanisms that create the best connection between people?" Saarikivi summarizes. </p> <p> </p> <p><strong>Curious about the technology trends set to shape 2024? <a href="https://www.dna.fi/dnabusiness/technology-trends-2024">Download the Technology Trends 2024 report</a>, which includes the 14 most significant trends. </strong></p>Mariela Pulkkanen2023-12-14T05:00:00ZDNA Cloud LAN guarantees the security and functionality of the local networkMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=160596752023-11-07T05:55:02Z2023-11-01T04:30:00Z<p class="ds-lead-paragraph">DNA Cloud LAN is an easy-to-deploy, high-quality, complete fixed and wireless local area network solution for business customers. The service includes centralized, cloud-based management and gathers the view of the entire network in one dashboard. Cloud LAN is an end-to-end service package which can be supplemented with information security services, among other things.</p> <p>Suppose your organization is currently considering updating local area network solutions, or you are just acquiring local area network services. In that case, DNA Cloud LAN is an option that works for these needs. DNA Cloud LAN is a local area network service intended for companies, which can be used to build a network that will meet the customer’s needs. In addition, the service brings both wired and wireless networks into one single view for more effective network management and maintenance.</p> <p>It is a service solution, which means that all the services, from competent administrators to designers and network architects, are included in the DNA Cloud LAN solution.</p> <p>"DNA Cloud LAN offers a single, centralized management platform for the entire network solution, including wireless and wired networks. The service has only one reporting channel, from which you can get a real-time picture of the network’s status and an idea of what has happened in the past," says <strong>Juho Saarinen</strong>, Business Manager of DNA's information security services. </p> <p>"Therefore, the customer is not left alone at any point of the service, with certified experts always available for support. The service also includes Zero-touch deployment, i.e. we deliver the devices to the customer. When connected to the network, the configuration takes place automatically," adds <strong>Vili Hamarila</strong>, DNA's Technical Architect.</p> <p>DNA Cloud LAN is a fully cloud-managed network implementation built on the Aruba Central cloud service. The solution is based on Aruba's technology and has been implemented in cooperation between DNA and Aruba.</p> <p>"The cloud as a management platform enables the customer to access a wider range of features. In addition, the artificial intelligence built into the service streamlines the resolution of tickets in the service layer. Artificial intelligence also helps more broadly detect causes for various problems," Hamarila describes.</p> <p>In short, DNA Cloud LAN gives the customer increased visibility into their network, a secure operating environment and more flexibility than before. The service is easily scaled from one location to a comprehensive solution that covers all of the organization's locations.</p> <p>"With Cloud LAN, customers get a unified and easily expandable local area network solution that enables users to have a fast, secure and effortless online experience," Saarinen sums up. </p> <div class="dna-video-container"><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/T6Jmw9muXQw?rel=0" width="560"></iframe></div> <p> </p> <p><a href="https://www.dna.fi/dnabusiness/network-solutions/internal-office-connections"><strong>Read more about local networks from here! </strong></a></p>Mariela Pulkkanen2023-11-01T04:30:00Z10 essential tips to strengthen your company’s cyber resilienceTiina Renqvisthttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=159062062023-10-18T11:57:47Z2023-10-18T11:49:00Z<p class="ds-lead-paragraph">Global geopolitical dynamics have prompted growing concerns regarding the need to bolster business continuity in numerous organizations spanning various industries. Strategic preparedness has long been a fundamental component of organizational cybersecurity strategies. The journey toward fortifying your company's cyber resilience commences with formulating a comprehensive cybersecurity strategy. </p> <p>Below, you find a list of ten key tips from DNA's Wholesale VP, Assi Oikari, and Dominique Akl, Head of the Network and Security Solutions, on improving your company's cyber resilience:</p> <h2 class="h3">1. Conduct a thorough risk assessment</h2> <p>Understand the risks that may obstruct your company's objectives. Assessments can be conducted internally or externally. Cybersecurity threats are more relevant than ever, and understanding vulnerabilities is key to developing effective mitigation strategies.</p> <h2 class="h3">2. Implement effective vulnerability management</h2> <p>Address the most critical vulnerabilities and establish an efficient process to ensure your business does not run on hardware or software that has reached its end of life. Unpatched software remains a leading cause of cybersecurity attacks.</p> <h2 class="h3">3. Invest in people and security culture</h2> <p>Hackers often target users rather than systems and applications. As a company owner or corporate leader, prioritize investments in raising security awareness and know-how. Design your business with security to combat increasingly sophisticated adversaries.</p> <h2 class="h3">4. Secure your network and data</h2> <p>Put effort into designing a robust network. Adopt a Zero Trust Access design, where no resource can be accessed automatically and is only possible upon verification. Essential security measures such as firewalls, encryption, DDoS protection, password policies, and multi-factor authentication must be in place.</p> <h2 class="h3">5. Safeguard connections</h2> <p>Your company's network solution is the foundation for safeguarding digital assets and maintaining operational continuity. Opt for a Virtual Private Network (VPN) for reliability. Recent developments have highlighted the crucial role of network operators in securing international connections, emphasizing the need for multiple physical routes via sea and land. Consider incorporating satellite backup solutions for added security in critical user cases.</p> <h2 class="h3">6. Remain vigilant against evolving phishing techniques</h2> <p>Promote awareness among your personnel regarding widespread phishing tactics and inform them of ongoing phishing attempts and new trends. Heightened sophistication in artificial intelligence technology has empowered fraudulent activities, underscoring the necessity for continuous vigilance and cautious online behaviour.</p> <h2 class="h3">7. Think about your remote workers</h2> <p>The COVID-19 era demonstrated how rapidly circumstances can change. Reevaluate your Remote Access solutions from today's perspective. Many remote access solutions are now integrated into a broader software-defined network offering, with centralized reporting and management, making incorporating Zero Trust Network Access (ZTNA) elements easy.</p> <h2 class="h3">8. React to the resource and competence shortage</h2> <p>Acknowledge the prevailing scarcity of competent cybersecurity professionals. Collaborating with a reputable managed service provider can present a viable solution, particularly for organizations facing constraints in executing cyber security activities internally. Entrusting an experienced partner with industry best practices ensures robust protection for your business.</p> <h2 class="h3">9. Be prepared by establishing an incident response plan</h2> <p>Preparing for security breaches requires a proactive approach. Prepare an incident response plan and include key partners and personnel in the planning process to ensure a coordinated and effective response in the unfortunate event of a security incident. The goal is to mitigate the impact and minimize disruption to your operations.</p> <h2 class="h3">10. Stay on the lookout!</h2> <p>Stay well-informed of the rapidly evolving global landscape and follow the development of relevant laws and regulations. Understanding your company's compliance obligations and devising a well-structured compliance strategy is pivotal in navigating the regulatory environment. Initiatives like the NIS2 Directive (EU directive addressing cybersecurity across member states) are prominent examples of regulatory developments demanding ongoing attention.</p> <p>Within growing geopolitical concerns, ensuring business continuity is a critical priority for organizations across diverse sectors. Establishing a robust cybersecurity strategy serves as a foundational step. You can start this by evaluating your performance against these ten essential points.</p> <p><br /> <strong>How do you ensure the operational reliability of your company's networks? <a href="https://www.dna.fi/dnabusiness/blogi/-/blogs/dna-s-information-network-services-ensure-connections-to-the-world-through-nordic-countries">Read how DNA's information network services ensure connections to the world through Nordic countries!</a></strong></p>Tiina Renqvist2023-10-18T11:49:00ZA bold leader sees the business opportunities presented by emerging technologiesMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=159058032023-10-18T09:31:48Z2023-10-18T09:26:00Z<p class="ds-lead-paragraph">Recent years have seen the pace of technological development grow exponentially. More data has been generated in the past five months than in the entire history of computing preceding them, not to mention new AI applications that are now publicly available. As a leader, how do you keep up with such rapid evolution? How do you lead your organisation when change is happening at a dizzying pace?</p> <p>Technological development is happening faster and faster, and I feel lucky to have had the opportunity to witness it over five decades – my entire career – in various leadership positions. In my first managerial position, my duties as a supervisor were mostly concerned with assigning tasks, setting targets and ensuring performance. We have come a long way since then, and the role of all leaders is now to act as a helmsman, a source of inspiration and ideas and a guiding star that shines a light on the goals set.</p> <blockquote> <p>The role is now to act as a helmsman, a source of inspiration and ideas and a guiding star.</p> </blockquote> <p>The role of a leader has become that of someone who steps outside their comfort zone every day, stays up to date with relevant new technology and geopolitical developments and recognises potential new business opportunities. You have to become a driven explorer in search of the blue ocean. You have to love what you do – enjoy being a penguin on a melting iceberg. You have to be able to tolerate constant change and uncertainty. At no point in my career have I stopped asking questions – I have let my curiosity lead me.</p> <h2 class="h3">Accelerating change demands a lot from a leader</h2> <p>By the year 2000, technological innovation had grown the world economy to twenty times what it had been a hundred years earlier in 1900. The previous century, in contrast, had only seen the world economy quadruple, and the one before that had only seen it double. As large tech companies have revealed their AI solutions to the world in recent months, the pace of technological development has taken another leap.</p> <p>When it comes to the spread of the technology, one milestone that has been discussed is exceeding 100 million users. It took mobile phones sixteen years to reach that milestone, the Internet seven years, and Facebook four and a half years. ChatGPT has reached it in three months.</p> <h2 class="h3">Ideas are born of understanding</h2> <p>As a business executive, how do you stay on top of it all? How do you get ahead and continuously increase your competitiveness? These are the questions many leaders are pondering right now.</p> <p>Looking at the big picture, you naturally have to recognise the external factors influencing your industry and your customers’ business environments and know logically how to implement them from the outside in, from what your customers and the market need to what your business provides. A pioneering leader learns, experiments and does not hesitate to ask how their organisation can test new ideas and uncover broader possibilities. Only through understanding can you achieve real change and get a handle on how the demands of leadership have evolved.</p> <blockquote> <p>A pioneering leader learns, experiments and does not hesitate to ask how their organisation can test new ideas and uncover broader possibilities.</p> </blockquote> <p>Developing your skills as a leader starts with understanding the world and knowing your business environment, but increasingly it also involves delving into technologies and opportunities that are from industries further afield than your own and fostering an adaptive organisational culture. In order to be able to dig your teeth into what this means for your business, you need to strengthen and develop your tech business skills.</p> <h2 class="h3">Ask questions</h2> <p>What are the core competencies of your business? How do technological opportunities get turned into organisational business understanding and operating models for your organisation? How do you create virtual realities in your mind? How do you become a pioneer who is part of the larger process of learning, experimenting with and implementing digitalisation as part of your business’s services or cyber resilience, or the processes that support sustainability and responsibility in your organisation? How do you view everyday business through the lens of your own operations or from the perspective of a customer? When was the last time you spent time in one of your organisation’s shops, factories or customer service centres, exploring its day-to-day processes, how smoothly they run and how effectively they could utilise AI?</p> <p>As the boss, you don’t have to be hidden away all the time. Tracking dirt in on your shoes, both virtually and physically, is a good thing.</p> <p>It’s not enough for a technology company to have its sales department talking to a corporate customer’s tech staff. You need to be able to convert complex technological solutions into business solutions that produce value for your customers or into new business models. Increasingly, companies’ target audiences are their customers’ business and process owners.</p> <h2 class="h3">The best way to learn is to keep pushing past your comfort zone</h2> <p>I think it’s about time for me to play Fortnite in order to understand the first version of the Metaverse or go on Discord to hone my understanding of what the next generation expects from working life.<br /> Whether you like it or not, history is replete with examples of how people welcome new technologies with open arms. The best way to prepare for change is to be an eager participant in it and to grasp its possibilities by boldly going forth and experimenting.</p> <p>In the end, management are the ones who are responsible for turning new opportunities into reality. Early adopters are the first to know whether a new technology is going to lead to profitable business opportunities or concepts or if it makes more sense to invest your resources elsewhere. Only by trying will you discover the opportunities.</p> <p>Get excited, encourage others and experiment!</p>Mariela Pulkkanen2023-10-18T09:26:00ZDNA's information network services ensure connections to the world through Nordic countriesMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=158308522023-10-18T09:32:30Z2023-10-12T13:38:00Z<p class="ds-lead-paragraph">Companies today depend on reliable cloud and data network services, with the services stored and used from the Internet. After DNA became part of the Norwegian Telenor Group, the Nordic and global cooperation in the field of connections has become even stronger. This has given DNA the opportunity to offer an even wider range of different connections for its customers, whether their services are domestic or abroad. What kind of route takes your company's connections from Finland to the world?</p> <p>"Customers of information network services typically use latency-critical applications, and service reliability of connections is thus very important. Customers look for reliable solutions from their operators. If necessary, our customers can improve their fault tolerance by acquiring customer-specific backup connections, which enable the services to function even in the event of a possible disruption of the primary connection. Pioneering companies have verified their routes with various physical alternatives by land and water, and even by using the satellite routes available in the range of services,” says <strong>Dominique Akl</strong>, Head of Network and Security Solutions at DNA.</p> <p>DNA offers high-quality services in the backbone and local networks of Finland and the Nordic countries, as well as in selected large European cities. DNA's own comprehensive network enables safe route connections.</p> <p>"DNA has its own fiber network and <a href="https://www.dna.fi/wholesale/blogi/-/blogs/redundant-subsea-cables-ensure-safe-and-secure-connections-abroad">sea cables</a> in Finland. The connections offer a fast route from Finland to the rest of the Nordic countries. In addition, Telenor has an almost 200,000 kilometers of optic fiber network in the Nordic countries, which also is constantly expanded," says <strong>Assi Oikari</strong>, DNA Wholesale's Director.</p> <p>"Telenor has a very strong network and coverage in Sweden, not forgetting the other Nordic countries. Now customers can expand their connections from Finland to the world even more nimbly. The importance of Nordic cooperation cannot be overemphasized in this context," says <strong>Joakim Andersson</strong>, Head of Wholesale at Telenor Sweden.</p> <p>The operational reliability of the networks is of primary importance for customers. Currently, there are three separate connection routes between Finland and Sweden: two sea cables and a land route, which are 100% owned by DNA. In addition, for the most critical operators, DNA can offer backup satellite connections based on satellites owned, managed, and operated by Telenor.</p> <p>"At the moment, all kinds of things are happening in the world, so security of maintenance must be on a solid foundation. Protecting marine cables from damage and repairing them are challenging tasks. That's why the land route from Finland to Sweden is excellent for connections in terms of verification," explains Andersson.</p> <p>Most typically, international connections are needed to connect offices operating in the Nordic countries. In addition, companies that use Microsoft Azure or AWS cloud services produced from data centers located outside the borders of Finland can ensure high availability and a stable, internet-independent connection between their offices and data centers. If a company needs connections from Finland to Norway or from Denmark to Finland, DNA and Telenor can make this easy with Nordic Connect, a service that guarantees quality classes across borders for applications with additional features.</p> <p>Akl, Oikari and Andersson notes that every customer's needs are different. This is taken into account from the first discussions, when it can be guaranteed that everything including the network design suits the customer's needs.</p> <p> </p> <p><a href="https://www.dna.fi/dnabusiness/network-solutions"><strong>Interested? Read more about DNA's communication connections! </strong></a></p>Mariela Pulkkanen2023-10-12T13:38:00ZDNA / Telenor Delivers Secure Client ZTNA Services with Fortinet for Customers in the Nordic RegionMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=154520382023-09-14T06:43:13Z2023-09-06T05:42:00Z<p class="ds-lead-paragraph">DNA – Part of Telenor Group (TELNY) - a leading technology and data communication provider in Finland and Northern Europe, and Fortinet, the global cybersecurity leader driving the convergence of networking and security, today announced that they have expanded their agreement with the delivery of DNA’s Secure Client ZTNA, powered by Fortinet Universal ZTNA. This service extends <a href="https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2019/telenor-selects-fortinet-to-deliver-one-of-the-nordic-region-s-f" target="_blank">existing Secure SD-WAN (Software Defined Wide Area Network) services</a> to reinforce zero-trust architectures that converge security and networking, while including more fine grain control features and creating value with zero-trust capabilities. </p> <p>In a world where employees are accessing resources from a variety of devices and locations, the traditional network perimeter can no longer be used as a reliable indicator of trust. Zero-trust has emerged to serve this expanding and evolving set of needs to build a safer work environment regardless of where the work is done —on-premises or remotely. Zero-trust is founded on the principle that no one and nothing can be implicitly trusted. The adoption of a zero-trust strategy has resulted in the popularity of zero-trust network access (ZTNA), a technology that helps to control access to applications. Users and devices are continuously monitored and verified - before every application session - to detect any changes that might indicate a compromise. </p> <p>The Secure Client ZTNA service by DNA enables the principle of least privilege in accordance with the zero-trust architecture. The service provides secure, remote access to applications and data using a range of security features and helps protect businesses from potential legal and financial consequences. It enables DNA / Telenor Nordics to build zero-trust capabilities by leveraging Fortinet Universal ZTNA, which simplifies the transition from virtual private networks (VPN) to ZTNA in a controlled and careful way. This smooth and seamless transition allows customers to move application coverage over to ZTNA gradually, one application at a time. The Secure Client ZTNA service is part of the Secure Site product family and includes hardware, software, licenses, expertise, and maintenance, with monthly billing. </p> <p>“The driving force behind the collaboration is the desire to meet the ever-changing challenges of the digital work environment. These flexible and easy-to-deploy security solutions enable customers to ensure a smooth and safe working environment for their employees, both in the workplace and when working remotely. Currently, Telenor Group is investing heavily in developing a secure pan-Nordic Telenor Nordic network portfolio by scaling up the leading local capabilities for true beyond connectivity benefits for its Nordic customers,” declares <strong>Juho Saarinen</strong>, Business Manager from DNA. </p> <p>“DNA has become a Fortinet Expert-level partner as part of our Engage Partner program for MSSPs. Leveraging Fortinet solutions including Fortinet Universal ZTNA, built on our unified agent FortiClient, DNA has developed comprehensive cybersecurity services solutions that aim not only to protect customers from potential cyber threats but also to anticipate future risks and ensure business continuity,” says <strong>Bjarne Lauritzen</strong>, Regional VP Sales at Fortinet. </p> <h4>About Fortinet </h4> <p><a href="https://www.fortinet.com/" target="_blank">Fortinet</a> is a driving force in the evolution of cybersecurity and the convergence of networking and security. Our mission is to secure people, devices, and data everywhere, and today we deliver cybersecurity everywhere you need it with the largest integrated portfolio of over 50 enterprise-grade products. Well over half a million customers trust Fortinet's solutions, which are among the most deployed, most patented, and most validated in the industry. The <a href="https://www.fortinet.com/nse-training" target="_blank">Fortinet Training Institute</a>, one of the largest and broadest training programs in the industry, is dedicated to making cybersecurity training and new career opportunities available to everyone. FortiGuard Labs, Fortinet’s elite threat intelligence and research organization, develops and utilizes leading-edge machine learning and AI (Artificial Intelligence) technologies to provide customers with timely and consistently top-rated protection and actionable threat intelligence. Learn more at <a href="https://www.fortinet.com/" target="_blank">fortinet.com</a>, the <a href="https://www.fortinet.com/blog" target="_blank">Fortinet Blog</a>, and <a href="https://www.fortinet.com/fortiguard/labs" target="_blank">FortiGuard Labs</a>. </p> <p> </p> <h4>About DNA – Part of Telenor </h4> <p>DNA is the agile part of Telenor Group (TELNY) and one of the leading telecommunications companies in Finland. Telenor Group provides telecom, data, and media communication services, owning both fixed-line and mobile networks in all Nordic countries and an established player in faster-growing emerging markets. DNA has been known for delivering the most comprehensive and seamless Secure SD-WAN service solutions in the Finnish market. As a forerunner in new ways of working, DNA / Telenor gets inspiration from digitalization and wants to realize its potential together with customers. </p>Mariela Pulkkanen2023-09-06T05:42:00ZEngines and sales purr when the connections workMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=152552082023-09-14T07:24:54Z2023-08-09T05:38:00Z<p class="ds-lead-paragraph">O.K. Auto, headquartered in Jyväskylä, operates nationwide in Finland. The company and its employees place particular emphasis on customer orientation and understanding customer needs which is why they demand the same from their partners. With the help of DNA, O.K. Auto has ensured secure and working connections.</p> <p>O.K. Auto has six full-service car dealerships across Finland and three Hämeen Autovaruste car dealerships focusing on retail and brand-specific repair services. Working days can often be difficult to predict - although 30 years of experience in the industry makes the predicting easier, laughs <strong>Harri Lätti</strong>, managing director of the stores.</p> <p>"Car dealership offers an interesting and challenging work environment, with a wide range of tasks to choose from. We offer our customers all the services they need for their cars. From car sales to spare parts and various maintenance services," Lätti describes.</p> <p>Lätti has a total of around 230 subordinates who need working connections for a smooth workflow.<br /> <br /> "We get everything from mobile phone subscriptions to firewalls from DNA. In two years of partnership, we have not had a single problem with connectivity, not even in the transition phase. We have been satisfied across the board with the overall service provided by DNA," says Lätti.</p> <h3>Success is a two-way street</h3> <p>O.K. Auto was convinced of DNA's expertise and services since the first contact: the offer was made on time, and from start to finish, there was a designated person of contact from DNA.</p> <p>"We had confidence that things would work, and everything was clear. I cannot stress enough the importance our person of contact, <strong>Juha Rauhala</strong>, had for us. He answers questions and is available for contacts. It's important that information travels accordingly."</p> <p>Juha Rauhala, Sales Manager at DNA, is pleased with the praises but points out that a good relationship is a two-way street. When the customer delivers the required information within the agreed timeframe, it is easier for the service provider to succeed in his own work.</p> <p>"We have a whole team working and supporting the salesperson in charge, from technical experts to the project manager. Things run smoothly with O.K. Auto when everyone works towards a common goal. The most important thing is to find a common understanding of the customer's business and needs," Rauhala sums up.</p> <h3>"Switching our service provider has already paid itself back"</h3> <p>Data connectivity is one of the things no one notices except when it's not working. Lätti and O.K. Auto have experience with this, as connecting calls was sometimes challenging with their previous service provider.</p> <p>"Such situations have completely disappeared since DNA came along: the Virtual PBX service works perfectly, and we hardly even noticed when switching service providers to DNA. The switch was effortless. We just inserted new SIM cards into the phones, and the mobile phone subscriptions were up and running in no time. For a long time, we wondered if we'd dare to switch our service provider, but it has paid itself back many times over."</p> <p>Car sales is a business that is always in a state of change. For example, when new technology comes rushing into the market and consumer habits change when it comes to making purchasing decisions. According to Lätti, the most important thing is to find the right tools to make things as easy as possible for customers.</p> <p>"People used to come to the shop to do business, but nowadays, they prefer to do business online and approach through multiple channels. These days cars are presented through videos via WhatsApp, for example. This requires new skills and different tools from our employees than before," says Lätti.</p> <p> </p> <div class="dna-video-container"><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/3LL_hNs5CL0?rel=0" width="560"></iframe></div>Mariela Pulkkanen2023-08-09T05:38:00ZDNA receives Fortinet's MSSP Partner of the Year AwardMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=146932082023-09-14T07:25:08Z2023-05-03T11:06:00Z<p class="ds-lead-paragraph">In April 2023, DNA received Fortinet's MSSP Partner of the Year Award to recognize exceptional cybersecurity sales and achievements in customer experience, collaboration, and marketing. DNA and Fortinet have been partners for years, and the key to success boils down to one simple principle.</p> <p>"Trust-based partnerships that you are willing to invest in are the ones that provide the most value," says <strong>Dominique Akl</strong>, DNA's Head of Network and Security Solutions. "Our relationship with Fortinet started a long time ago, and we were among their first partners in Finland around 2006 or so. We have invested a considerable amount of time, money, and effort in fostering that partnership to get the most out of it for both parties," he continues. </p> <p>For DNA, that means committing to training and certifying their employees to the degree of having the most Fortinet specializations in Finland. The company also goes the extra mile with its customer support, and the efforts have been noticed. </p> <p>"Our Expert partnership status recognizes our work to ensure our customers have access to the best possible solutions for their needs and top-notch customer support from highly skilled people, should they need assistance. As the status is given once the strict qualifications are met, it communicates to our customers that we are reliable, have the know-how, and are among top-tier managed security service providers," Akl explains. </p> <p>Although DNA has won three local Fortinet awards in Finland already, the MSSP Partner of the Year Award for EMEA acknowledges the persistent, long-term work that has also enabled growth. Fortinet's channel partners play a crucial role in helping Fortinet secure users, devices, applications, and edges everywhere. DNA has the ability to design and deliver meaningful solutions and win customer cases. Their continuous growth demonstrates customer happiness and that the value proposition makes sense. </p> <p>"We're proud to be Fortinet's 2022 MSSP Partner of the Year at the EMEA district. Our in-house know-how expertise with Fortinet's products and services, that we have a wide portfolio of, strong marketing campaigns, and the ability to execute and train people have culminated in this award. We see the nomination as a recognition of our commitment to our customers. We look forward to another year as a Fortinet Partner to help secure our business customer's business and services," Akl celebrates. </p> <h3>Increased security awareness leads into increased demand</h3> <p>Fortinet is a cyber security company delivering software and hardware solutions through its partners. DNA is among the top-tier companies in Finland that fulfill the highest partnership requirements. That means they possess the top-notch ability to deliver and operate securer networking solutions for Finnish B2B customers based on Fortinet technology. </p> <p>In Finland, the demand is increasing at a steady pace. The regulators are a significant driver for improving cyber security, and geopolitical uncertainty brings its flavor to the mix. Another factor is the growing level of awareness. </p> <p>"One of the trends we have identified is the growing demand for securing industrial-level solutions to the same fashion companies secure their headquarters and offices. Factories and infrastructures need to be secured the same way to increase resilience," Akl explains. </p> <p>DNA continuously develops its Fortinet portfolio to ensure its customers can access the best solutions for their needs. From Next Gen Firewall Solutions to Centralized Management and Reporting to Zero Trust Network Access, SD-WAN, and Secure SD-Branch, DNA offers a wide array of services that come with its connectivity and consultancy services as a one-stop shop solution. </p> <p> </p> <p><a href="https://www.dna.fi/dnabusiness/data-security"><strong>Read more about DNA’s Data Security Services! </strong></a></p>Mariela Pulkkanen2023-05-03T11:06:00ZDNA and Noccela are building next generation IoT for Finnish businessesMariela Pulkkanenhttps://www.dna.fi/c/blogs/find_entry?p_l_id=887629&entryId=144460912023-09-14T07:25:24Z2023-03-23T09:00:00Z<p class="ds-lead-paragraph">Sometimes even a ten-centimetre movement matters. This can be the case for example when a factory aims to reduce idle time and streamline their operations.</p> <p>Monitoring movements this small is possible with Ultra-Wideband, i.e., UWB technology. It is a wireless data transfer technique that enables a more accurate tracking of products moving on a production line, for example.</p> <p>A good example is a factory assembled product that moves short distances in the assembly line to the next phase. Using UWB technology, a company can, for example, automate the process of marking steps completed and find out how much time each step takes. </p> <p>UWB is a significant stage in the development of Internet of Things (IoT). Now DNA and Noccela are co-developing UWB solutions for Finnish businesses, helping to lift IoT development to the next level. Through this collaboration, the clients of DNA and Noccela can, for example, integrate separate production related systems under a shared operations system.</p> <p>“UWB’s absolute benefit is its accuracy. Another benefit is that UWB tags can communicate with each other. In practise, this enables for instance that an autonomous vehicle moving in a factory can recognize an employee carrying a tag. UWB is very data secure. Its radio communication cannot be listened to, as the signal level is close to static noise. The technology was originally designed for military use,” says <strong>Ville Kantola</strong> from DNA.</p> <p>“The biggest advantages of UWB are achieved in industrial environments. It helps in adding visibility to different work phases and reporting to the management,” says <strong>Lauri Poikela</strong>, Head of Customer Success at Noccela. </p> <p>For example, in terminal operations, UWB can be utilised in monitoring the departing and arriving traffic. In fact, the technology has also been piloted as an access control solution at the DNA's office premises in Helsinki. The guests were given a UWB tag that alerted the reception staff whenever a guest left the area meant for guests. </p> <p>“We also equipped the visitor tags with a button that the guests could press if they needed help. The reception personnel received the location of the person in need of assistance and could come over to help them in person”, Kantola says. </p> <h3>Accuracy and scalability convinced Hiab </h3> <p>One of the clients of DNA and Noccela is Hiab, a provider of load handling equipment solutions. Their production includes various phases, and Hiab wanted to find out about the production bottlenecks and idle times.</p> <p>“We were interested specifically in the accuracy benefit of UWB technology. The indoor positioning with UWB is accurate and cost-efficient,” says <strong>Joni Rajala</strong>, Lean Facilitator at Hiab. </p> <p>The aim is to recognize and eliminate work that does not add value. This is the case when, for example, an item is statically waiting its turn in production. UWB helps scanning each phase of the whole production process. This used to require a person timing each work phase with a clock. Hiab is already envisioning the next use cases for the technology. </p> <p>“We have received some good ideas from Noccela on how to use positioning. One example is to build triggers in warehouses that will alert you when a certain number of tags have arrived in a certain area. This can provide important information for the management. We are also working on other new solutions for internal logistics to locate components and materials inside and outside the factory. The best thing about the cooperation has been the versatility of the solution offered and Noccela's can-do attitude," says Rajala. </p> <p>The work runs smoothly when the employees know the goals. In addition to too slow a production pace, the problem can be too fast production, as that may cause quality issues.</p> <p>“For me, lean thinking is a synonym for well-being at work. None of us wants to do useless work,” Rajala says. </p> <div class="dna-video-container"><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/Y05qhdM9wDQ?rel=0" width="560"></iframe></div> <p> </p> <p><a href="https://www.dna.fi/dnabusiness/network-solutions/private-network"><strong>Read more about private networks and contact us! </strong></a></p>Mariela Pulkkanen2023-03-23T09:00:00Z