Cybersecurity in a 5G post-COVID future

busy woman working remotely from home PBJCL5N

Cybersecurity in a 5G post-COVID future

The impact of 5G and COVID-19 on the security landscape

Cybersecurity in a 5G, post-COVID future

 

The threat from cybercriminals is omnipresent and unceasing. Their approach to cybercrime is becoming increasingly sophisticated. Their tools, techniques, and technologies are evolving at rapid speeds. And they need only expose one weakness in an organization’s defenses, and the walls can come crashing down.

While 5G has been branded as the great enabler, unlocking a wealth of exciting new technologies and experiences, it has also presented cybercriminals with new opportunities to evolve their attack methods and gain access to a company’s infrastructure.

The COVID-19 pandemic has created even more challenges for CIOs and security teams, sparking a surge in cybercrime across the globe. Here, we take a look at some of the key cybersecurity trends to be aware of as we usher in the new, 5G-powered age, and how the pandemic has thrust these security issues into even sharper focus.

 

Zero Trust cybersecurity with 5G

While it always pays to approach cybersecurity with scrupulous detail, the industry has learned many lessons over the years that will put us in good stead when it comes to 5G security. Indeed, many of the key learnings from 3G and 4G security have already been embedded into the 5G architecture.

What’s more, security is the central pillar of the 3rd Generation Partnership Project (3GPP) – the collective of standard development organization for mobile telecoms – around which all its standards are built. This means a huge range of new capabilities and architecture concepts have been built into 5G, helping network transport be inherently more secure.

Despite all this, vulnerabilities will always exist. That’s why 5G also enables Zero Trust, which means no component of a network can execute any action or transmit any data to another entity without being authenticated and authorized.

Additionally, 5G incorporates comprehensive encryption standards and encryption methodologies, so data is secured and encrypted in transit. There’s no doubting that, despite the rise in cybercrime sparked by the COVID-19 pandemic, 5G is the most secure generation technology in history.

 

A new way of building security

Regardless of 5G’s robust security standards and Zero Trust approach, vulnerabilities will always exist. And while 5G doesn’t inherently create more risks, enterprises must be able to recognize the dangers associated with the new use cases that 5G enables, particularly around the proliferation of IoT and increasing connectivity between devices.

To meet these security issues head on, organizations must abandon the historical approach of building security from the bottom up. It’s time to flip this logic and build security capabilities with individual use cases in mind. By examining the risk exposure and worst-case scenarios of each use case, companies need to build security for each application, while enabling fast and effective capabilities. Effort should be proportional to the risk, meaning each use case should be treated differently.

There’s no doubting that 5G will enable a plethora of exciting new opportunities, but if security risks aren’t addressed, consumer trust will quickly erode and disappear. And businesses can’t build that consumer trust in the first place if they’re unable to demonstrate how they protect 5G-enabled environments.

 

The impact of COVID-19 on global cybersecurity

There’s no arguing that the pandemic changed everything – across every sector and industry imaginable. In terms of cybersecurity, if anything, the pandemic threw the need for a more robust security structure into even sharper context.

The remote nature of today’s workforce has exposed a multitude of new cybersecurity risks. For example, the widespread and rapid migration to cloud to enable remote working has resulted in a much broader attack surface for cybercriminals looking to find ways into an organization.

Pre-COVID-19, cybercriminals were successfully using tried and tested methods to penetrate businesses and obtain sensitive data. It goes without saying that if these tactics worked in a stable business environment, they’ve been working even better in an era of such disruption and uncertainty. Even tech giants like Microsoft, Facebook and Twitter have suffered attacks, alongside state and government services.

So far, we have seen three common threat methods increase throughout the pandemic:

Rise in human error: Faced with major disruption, increased workloads, and the distractions of a home-working environment, it’s no wonder that more individual, human errors have been reported during the pandemic.

Credential-related hacking: With large swathes of the working population requiring remote access and workstation maintenance, IT departments face the challenge of securing company assets on a corporate network while most of the workforce is out of the office. This has widened the number of remote access opportunities for cybercriminals.

Phishing for emotion: Phishing scams represent one of the go-to methods among hackers, but COVID-19 has seen a rise in phishing emails that take advantage of people’s emotions during such challenging times. In an attempt to exploit the uncertainty and fear that the pandemic created, there was a marked increase in phishing emails that contained the words ‘COVID’, ‘Coronavirus’, ‘masks’, ‘test’, ‘quarantine’ and ‘vaccine’.

 

Security lessons learned

5G brings opportunity and challenges in equal measure, especially around cybersecurity. And, while there’s no denying that the rise of new, 5G-enabled use cases will invite more cyberattacks, our ability to cope and adapt to the disruption and uncertainty of 2020 serves as a key learning moving forwards.

The pandemic helped us all realize that we can move quicker than we thought possible, and in security terms, it highlighted the need for a more robust – yet bespoke – cybersecurity infrastructure: an infrastructure that will serve the needs of a 5G-powered world, with security sitting at the very heart of it.

 

We’re Synium IT, how can we help?

Our aim is to become a seamless and invaluable part of your team – so you can be sure of exceptional service and a proactive, friendly and jargon-free approach to IT.

Synium IT provides the full range of IT support services to organisations throughout the West Midlands.  Our approach is to deliver the very best IT Support services to our clients for great value for money, with no contract tie-in. Allowing you to experience the benefits of your own IT support partner without any risk.

Contact us today on 0121 663 0203 to find out more about how we can help.

 

News Source: https://www.techradar.com/

Simon Tonks
simon@synium.co.uk

Owner and MD of Synium who loves his job, his life and the wondrous outdoors - especially when on a golf course, or a bike of any kind (but preferably on a mountain bike going downhill fast).Please get in touch if there is anything IT related I can help you with (or if you want to talk golf or bikes :-)