
The Challenge
With over 1000 dedicated employees across 22 locations and a legacy spanning five decades, Telikom Limited is not just a telecommunications giant: it’s a custodian of trust. As the organization sets its sights on becoming the market leader in Papua New Guinea by 2025 and the region by 2032, the need for a robust cybersecurity posture is imperative. ISO certification requirements underscored the necessity for advanced cybersecurity controls.
Facing the dual challenge of protecting a vast volume of customer data and countering the rising threat of cyberattacks, Telikom was determined to go beyond conventional solutions. Leadership at Telikom recognized the inadequacy of traditional tools like Antivirus and Firewalls, and sought a proactive, cutting-edge solution to meet the demands of modern cybersecurity.
The Solution
Enter BlackFog, a game-changer in the realm of anti data exfiltration technology. Telikom’s Head of ICT and Transport Network, Navindar Singh, brought first-hand knowledge of BlackFog’s capabilities from his previous tenure in Australia so the decision to trial BlackFog on Telikom’s corporate devices was swift and intuitive.
“My previous company in Australia moved to BlackFog and we saw the advantages of real-time protection compared to other solutions right away. When I moved to Telikom I knew that the product would provide us with the level of protection we required, especially as we are hearing about ransomware and extortion more and more.
In PNG there is a big interest in cybersecurity, and we hear about companies getting attacked all the time. In order to mitigate the risks, an automated preventative approach just made sense”, commented Navindar.
The Approach
During the seven-day trial period on 25 corporate devices and critical servers, BlackFog proved its worth. Crucially, it offered real-time protection without compromising system speed. The Enterprise Console unveiled a staggering 15,000 alerts, exposing attempts to exfiltrate corporate files. The trial was not just a test; it was an eye-opener.
The Results
Post-trial, the decision to deploy BlackFog across all internal devices was a natural progression. Navindar commented, “Telikom’s commitment to preventing ransomware and data exfiltration attacks is unwavering. With BlackFog, we have not only found a guardian for our valuable customer data but also a 24/7 automated shield that doubles as our Security Operations Center (SOC) “.
Telikom’s CEO, while traveling in China, experienced BlackFog’s prowess first-hand. Attempting an online banking transaction, he witnessed BlackFog in action as it automatically blocked traffic to China, potentially thwarting a threat. It wasn’t just a moment of frustration turned into relief; it was a testament to the proactive defence that BlackFog delivers.
When asked about BlackFog’s features and functionality Navindar emphasized BlackFog’s reporting capability, highlighting live ransomware attack information and trends data. “Approximately 1000 attempts are blocked monthly, showcasing the solution’s effectiveness. So confident are we in BlackFog’s capabilities that we plan to extend this powerful shield to our customers in the near future”.
Conclusion
Navindar concluded “at Telikom Limited, we don’t just connect people; we safeguard their trust. The partnership with BlackFog reflects our commitment to staying ahead of cyberthreats, providing unparalleled protection for our customers, and setting new benchmarks in cybersecurity excellence. Trust Telikom Limited and BlackFog – Your Guardians in the Digital Frontier.”
Share This Story, Choose Your Platform!
Related Posts
BlackFog ADX Instinct: Your Virtual CISO
ADX Instinct, our expert-led virtual CISO service provides strategic guidance, risk management and tailored compliance support.
BlackFog Report Reveals 36% Increase in Q3 Ransomware Attacks YoY
BlackFog report reveals 36% YoY increase in Q3 ransomware attacks 2025, with healthcare, government and technology among the hardest hit.
2025 Q3 Ransomware Report
BlackFog’s 2025 Q3 Ransomware Report - global cyber battlefield heats up as ransomware groups escalate attacks. Download full report for key insights.
How To Prevent Phishing: Essential Strategies for Businesses
Find out everything you need to know about how to prevent phishing attacks from impacting your business in our comprehensive guide.
Spear Phishing Explained: How To Recognize And Prevent Targeted Cyberattacks
Targeted spear phishing attacks remain a threat to every business. Make sure your employees know how to spot them and what to do to minimize the risk.
What Is Clone Phishing? How To Detect And Prevent This Overlooked Cyberthreat
Clone phishing is a subtle but dangerous attack that's easy to miss. Learn how it works, how it differs from other threats and what to do if someone falls victim.





