8 minute read

Bahwan Logistics Executes International Road Transport Shipments from UAE Freezone to Duqm Freezone

Bahwan logistics Manages Haulage of Over Dimensional Cargo from UAE to Duqm

Following the successful sponsorship and participation of IRU held in Oman in 2018, Bahwan Logistics’ initiative to execute International Road Transport (TIR) shipments fructified in the month of November 2020, with execution of six Over Dimensional Cargo (ODC) movements from Jebel Ali Free Zone to Duqm Freezone with a single TIR document and very minimum customs clearance time at Oman borders. The entire cargo movement was done in collaboration with DG Oman Customs/Sinyar and Mwasalat

Advertisement

TIR (Transports Internationaux Routiers or International Road Transport) is an international customs transit and guarantee system recognised for being effective, efficient and secure for the transportation of goods internationally. TIR facilitates the movement of goods from country of origin, through transit countries, to a country of destination in sealed compartments that are controlled by customs prior to an approved and recognised system. TIR allows the transport operators and customs authorities to save time and money.

Congratulations BLL team- this is another feather in the cap of Bahwan logistics LLC ‘s professionalism and ability to handle Oman land /Sea/Air border customs clearance services.

Bahwan logistics recently delivered an Over Dimensional Cargo (ODC) - a 5.2 diameter Dual Media filter equipment from Jebel Ali Free Zone, UAE to Duqm Water Desalination plant in Central Oman covering a distance of over 1000 kms in a record period of 4 days.

The haul involved usage of Multi Axle Low Low Bed Trailer with private and police escorts and was executed after an exhaustive route survey executed in coordination with the Ministry of Transport and the Royal Oman Police.

The entire operations was handled by Bahwan logistics operations and warehouse team, under the stewardship of Mr. Saurav Ghosh, General Manager.

The client, Cobra Tedagua Company, expressed extreme satisfaction in the way the cargo movement was managed.

Congratulations BLL team!!

Bahwan Furnishings & Trading Completes Bu Haleeba Project

Bahwan Furnishings and Trading Completes Major Furnishing Project for Dhofar Power Company

Bahwan Furnishings & Trading has completed and handed over the project for supplying and installation of doors, wardrobes and kitchens for the Client Bu Haleeba Contracting located at Madinat Irfan. The project is a luxury commercial and residential complex.

Bahwan Furnishings and Trading (BFT) has successfully completed a major Furniture, Fixtures, Equipment and Interior Design project for Dhofar Power Company (DPC)’s corporate office in Salalah.

The turnkey project involved design, supply and installation of office furniture, lounge area furniture, double glass proprietary partition, wooden wall panelling and ceiling, firerated wooden doors, moveable partitions and customized furniture like reception counters, pantries etc…

The entire project was executed on time as agreed with the client and consultant adhering to strict HSE norms and handed over to the client.

Bahwan Furnishing and Trading Completes Auditorium Seating Projects for Ministry of Education and Ministry of Social Development

In another milestone, Bahwan Furnishing and Trading (BFT) successfully completed the supply and installation of two auditorium seating projects – one for the Ministry of Education (MoE) in Al Khuwair, Muscat and another for the Ministry of Social Development (MoSD) at Muscat Hills

The MoE auditorium with a capacity of 300 and the MoSD auditorium with a capacity of 700 were fitted with state-of-the-art, ergonomically designed and fabricated seats, supplied by Leadcom company from China and installed by BFT team.

BFT achieved another milestone by delivering both projects on time as set by the clients.

Congratulations BFT team!

The Threat of The Threat of Ransomware! Ransomware!

By: Sajan Kumar, Senior Security Consultant and Iqbal Kazi, Senior Security Consultant - Bahwan IT.

Ransomware, a type of computer-based attack that blackmails computer users by denying access to their own data or threatening to disclose their data public, is a growing threat to organizations of all sizes.

The development of cryptocurrencies like Bitcoin, a virtual currency, has enabled these attackers to more easily be paid anonymously by cyber-villains. This article explores exactly what this dangerous phenomenon Ransomware is and what we need to do to protect our data and our organization.

As mentioned above, the ransomware ether denies access to your own data or threatens to disclose your data to the public. These attackers are becoming increasingly sophisticated in pricing the ransom amount and in the technologies they utilize. The same approach can be taken to mitigate your exposure to these attacks. How Does Ransomware Work?

Ransomware typically spreads via spam, phishing emails, or through social engineering efforts. It also can be spread through websites or drive-by downloads to infect an endpoint and penetrate the network. Once in place, the ransomware then locks all files it can access using strong encryption. Finally, the malware demands a ransom (typically payable in Bitcoins) to decrypt the files and restore full operations to the affected IT systems.

HOW RANSOMWARE SPREADS?

5 Tips to Lower Your Risk of Attack

Educate your Workforce

Educate your colleagues to watch out for any emails or pop-up messages that look suspicious; do not click on any attachments or messages. There are a lot of resources available to help with this. Keep in mind that this is a process, not an event or a destination.

Back Up your Data

The best way is to periodically back up your data externally. With the Cloud available, having multiple backups is not too expensive. Even in the case of an attack, your data is saved and can be recovered so that your organization’s business runs without any interruption. Someone needs to be responsible for this process.

Patch your Software

Most ransomware attacks are targeting known vulnerabilities that should have already been patched. Frequently, organizations are duped into running operating system software on computers and servers that are no longer being patched for security purposes. The usual excuse is that some application won’t run on the new version of the software or that there just isn’t enough time to test a new patch. Do not fall into this trap. You should never operate your enterprise on unpatched software.

Utilize Layered and Multi-Tiered Security Protections

Layered and multi-tiered security protections makes your computing environment safer. This can be done on-site, in the Cloud, or you can purchase it as a service. If you have sensitive data, particularly including personal identity information for customers, patients or employees, then you have an obligation to protect their data. Investing in technology tools that prevent sensitive data from being transmitted in an insecure method is the best method.

Assess your Vulnerability

The users should know basic things: What data do you have and how sensitive is it? How many servers and related operating systems do you have and what is their update status and policy? What is your patching policy and how closely is it being followed? Also, it is always best to have another set of eyes periodically looking at what you are doing.

Train Your Staff onTest Readiness for an Attack

Another necessary component in any cybersecurity process is to make sure your staff is trained in preventing cyber hacks, and knows what to do if one occurs. So document cybersecurity processes — one for your IT team, and another for the employees across your company. Train staff on the malware-prevention steps outline above, such as not opening suspicious emails or downloading apps or files from websites unless they are certain of their legitimacy. Social Engineering, the human user, is often one of the weakest links in the security chain.

Train your staff also to isolate a device should they discover it has been infected with malware, ensuring the damage is minimized and not letting the malicious code replicate itself across your network.

Lastly, run drills, performing regular tests to help your employees learn how to react to a cyber-attack so that their response, should one occur, is smooth, thorough, and most importantly, immediate.

How to respond to Ransomware attack.

1. Isolate the Infection: Prevent the infection from spreading by separating all infected computers from each other, shared storage, and the network.

2. Identify the Infection: From messages, evidence on the computer, and identification tools, determine which malware strain you are dealing with.

3. Report: Report to the authorities to support and coordinate measures to counterattack.

4. Determine Your Options: You have a number of ways to deal with the infection. Determine which approach is best for you.

5. Restore and Refresh: Use safe backups and program and software sources to restore your computer or outfit a new platform.

6. Plan to Prevent Recurrence: Assess how the infection occurred and what you can do to put measures into place that will prevent it from happening again.

Down the Memory Lane….

During the course of Suhail Bahwan Group’s 50 years’ history, we have come across several events/occasions and landmarks many of which have been photographed and preserved for posterity. In this issue, we present you with a set of rare photographs of our Chairman Sheikh Suhail Bahwan on various occasions.

This article is from: