As 5G networks roll out around the world, their potential to accelerate adoption in the workplace is sure to attract more attention. But are concerns about 5G security real, especially in the early stages of 5G implementation across the enterprise? As one of the most revolutionary technologies in the digital age, 5G technology has shown great potential. As suppliers begin to deploy 5G networks around the world, the global 5G infrastructure market is expected to exceed US$42 billion by 2025. From ultra-high-definition streaming to enhanced sensor detection for utility companies, 5G could have a huge impact in entertainment, energy, communications, manufacturing, and more. While 5G’s true transformative potential is uncertain—the most creative and innovative applications will emerge once cellular technology becomes entrenched—the combination of ultra-high network speeds and ultra-mobility could fundamentally change the way we work. Paul Martini, cloud security expert and CEO of iboss, told TechHQ: “The incredible increase in bandwidth enabled by 5G technology will have a huge impact on all things cloud-related, allowing users and devices to use virtually any cloud application from any location.” However, the rise of 5G will also “upend the traditional scope of the office.” “Before 5G and the cloud, the office was the building where users worked. Now, with 5G, the office perimeter will become the users and devices themselves.” Martini told us that while this can provide more freedom and flexibility in how businesses and workers operate, the increase in mobility can also bring unique challenges to organizations. In the 5G era, users are no longer limited to Wi-Fi networks. The decentralization of the network requires administrators to reevaluate the way users access organizational files and perform business work. "To use an analogy, some organizations used to build castles and moats around their buildings with security equipment," Martini said. "The problem is that people don't work in castles anymore." Martini believes the rise of 5G will ultimately mark the end of the network perimeter — which will have implications for how businesses must structure themselves to defend against security threats. Today’s employees have access to more information than ever before, which means traditional cybersecurity measures are no longer effective. The increased bandwidth provided by 5G, and wider access to ultra-high-speed connections, could provide attackers with a larger surface area and the ability to carry out attacks more effectively – so users and devices outside the office will be more vulnerable than ever before. According to UK cybersecurity group Information Risk Management, 83% of cybersecurity leaders across industries claim to be "troubled" by the increased risks posed by 5G connectivity. Organisations must then consider security challenges in a more holistic way, as Martini says the concept of "building a moat around the castle" is not an adequate model - instead, 5G connectivity will require businesses to double down on protecting users and devices outside the office perimeter. “That’s why it’s critical to shift the design paradigm from security strategies designed for fixed buildings, such as cybersecurity appliances, to cybersecurity strategies that work in the cloud, wherever users go,” Martini said. At the end of 2019, EU member states released a joint risk assessment report on 5G technology, advocating a new approach to address the multi-dimensional security challenges of the new generation of networks. 5G strategists and industry insiders suggest developing end-to-end security in the network to address the security concerns mentioned. Take network slicing as an example, each "service category" will have its own different network requirements. By doing so, the "service category" will have its own virtual network slice, specifying data transmission through high bandwidth and ultra-low latency without affecting other services. As we move toward a 5G-connected business future, the most forward-thinking businesses can expect unfettered adoption. However, every investment in 5G’s potential must be matched by an investment in equally sophisticated and comprehensive security. |
>>: 129 apps were notified for illegally collecting and using personal information
While the industry has painted many bright prospe...
Fiber optic technology has revolutionized innovat...
Imagine a business-critical network that is runni...
[51CTO.com Xi'an report] The "2017 Unive...
LOCVPS (Global Cloud) is an early established Chi...
At the 2019 Mobile World Congress, Huawei brought...
[[183847]] There is a distinct difference between...
The coronavirus outbreak has had an unprecedented...
5G technology has enough advantages to support so...
When it comes to IP addresses (IPv4), common IP a...
[51CTO.com original article] On August 7, 2017, N...
51CTO conducts dozens of procurement surveys for ...
[[442675]] This article is reprinted from the WeC...
Recently, the Ministry of Industry and Informatio...
5G was oriented to vertical industry applications...