صدى البلد البلد سبورت قناة صدى البلد صدى البلد جامعات صدى البلد عقارات
Supervisor Elham AbolFateh
Editor in Chief Mohamed Wadie

Suspending Umrah permits and preventing entry to Mecca for holders of visit visas.. Video


The Saudi Ministry of Hajj and Umrah announced that it will stop issuing Umrah permits through the “Nusak” application

Thu 23 May 2024 | 12:48 PM
Suspending Umrah permits and preventing entry to Mecca for holders of visit visas.. Vedio
Suspending Umrah permits and preventing entry to Mecca for holders of visit visas.. Vedio
amir hagag

The Saudi Ministry of Hajj and Umrah announced that it will stop issuing Umrah permits through the “Nusak” application, starting today, Thursday, marking the start of this year’s Hajj season.

The Ministry stated that it was decided to prevent holders of all types of visit visas from entering or staying in Mecca, starting from “15 Dhul-Qi’dah” until “15 Dhul-Hijjah” 1445 AH, and entry is restricted to holders of Hajj visas. In order to enable regular pilgrims to perform rituals easily.

She stressed that there is no Hajj without a permit, and penalties will be strictly applied against anyone violating the regulations, especially those caught within the geographical area designated for regular pilgrims.

Earlier, the National Cybersecurity Authority in Saudi Arabia carried out, on Wednesday, a cybersecurity exercise for the Hajj season 1445 AH, with the aim of enhancing the cyber readiness of the national entities participating in the Hajj season, developing the skills of their specialists in the field of cybersecurity, and enabling them to enhance their cybersecurity, with the participation of more From 200 national bodies, represented by more than 600 officials and specialists in the field of cybersecurity.

The authority explained - according to what was reported by the Saudi News Agency (SPA) - that the exercise comes within the tracks of the program to enhance cybersecurity for this year’s Hajj season, and deals with conducting simulations of different types of cyber attacks, and applying the response mechanism for cyber incidents, starting with preparedness, detection, and analysis, then containment and recovery. And post-incident procedures, sharing information and lessons learned. The exercise also included a set of technical and administrative activities to find innovative solutions to confront renewed cyber challenges and threats in accordance with the best standards and practices.