As 5G networks roll out around the world, their potential to accelerate adoption in the workplace is sure to attract more attention. But are concerns about 5G security real, especially in the early stages of 5G implementation across the enterprise? As one of the most revolutionary technologies in the digital age, 5G technology has shown great potential. As suppliers begin to deploy 5G networks around the world, the global 5G infrastructure market is expected to exceed US$42 billion by 2025. From ultra-high-definition streaming to enhanced sensor detection for utility companies, 5G could have a huge impact in entertainment, energy, communications, manufacturing, and more. While 5G’s true transformative potential is uncertain—the most creative and innovative applications will emerge once cellular technology becomes entrenched—the combination of ultra-high network speeds and ultra-mobility could fundamentally change the way we work. Paul Martini, cloud security expert and CEO of iboss, told TechHQ: “The incredible increase in bandwidth enabled by 5G technology will have a huge impact on all things cloud-related, allowing users and devices to use virtually any cloud application from any location.” However, the rise of 5G will also “upend the traditional scope of the office.” “Before 5G and the cloud, the office was the building where users worked. Now, with 5G, the office perimeter will become the users and devices themselves.” Martini told us that while this can provide more freedom and flexibility in how businesses and workers operate, the increase in mobility can also bring unique challenges to organizations. In the 5G era, users are no longer limited to Wi-Fi networks. The decentralization of the network requires administrators to reevaluate the way users access organizational files and perform business work. "To use an analogy, some organizations used to build castles and moats around their buildings with security equipment," Martini said. "The problem is that people don't work in castles anymore." Martini believes the rise of 5G will ultimately mark the end of the network perimeter — which will have implications for how businesses must structure themselves to defend against security threats. Today’s employees have access to more information than ever before, which means traditional cybersecurity measures are no longer effective. The increased bandwidth provided by 5G, and wider access to ultra-high-speed connections, could provide attackers with a larger surface area and the ability to carry out attacks more effectively – so users and devices outside the office will be more vulnerable than ever before. According to UK cybersecurity group Information Risk Management, 83% of cybersecurity leaders across industries claim to be "troubled" by the increased risks posed by 5G connectivity. Organisations must then consider security challenges in a more holistic way, as Martini says the concept of "building a moat around the castle" is not an adequate model - instead, 5G connectivity will require businesses to double down on protecting users and devices outside the office perimeter. “That’s why it’s critical to shift the design paradigm from security strategies designed for fixed buildings, such as cybersecurity appliances, to cybersecurity strategies that work in the cloud, wherever users go,” Martini said. At the end of 2019, EU member states released a joint risk assessment report on 5G technology, advocating a new approach to address the multi-dimensional security challenges of the new generation of networks. 5G strategists and industry insiders suggest developing end-to-end security in the network to address the security concerns mentioned. Take network slicing as an example, each "service category" will have its own different network requirements. By doing so, the "service category" will have its own virtual network slice, specifying data transmission through high bandwidth and ultra-low latency without affecting other services. As we move toward a 5G-connected business future, the most forward-thinking businesses can expect unfettered adoption. However, every investment in 5G’s potential must be matched by an investment in equally sophisticated and comprehensive security. |
>>: 129 apps were notified for illegally collecting and using personal information
Apple's iCloud Private Relay service offers p...
There is a wind power plant abroad that mainly us...
For some people, the signal of one wireless route...
From the early days of dial-up to the impending a...
Over the past five years, IT professionals who fo...
[51CTO.com original article] With the rapid devel...
WePC uses the .au domain name and describes itsel...
With the advent of 5G technology, 5G has become a...
[[398639]] This article is reprinted from the WeC...
What service do you like the most? The most likel...
[51CTO.com original article] On September 25, 202...
spinservers sent a promotional plan for this Chri...
"In the 6G era, hundreds of high-definition ...
At the Hot Chips conference, PCI-SIG said it woul...