Blog Layout

Dealing with cybersecurity in a 5G, post-COVID future

Chris Lunn • Mar 29, 2021

The impact of 5G and COVID-19 on the security landscape

Cybersecurity in a 5G, post-COVID future


The threat from cybercriminals is omnipresent and unceasing. Their approach to cybercrime is becoming increasingly sophisticated. Their tools, techniques, and technologies are evolving at rapid speeds. And they need only expose one weakness in an organization’s defenses, and the walls can come crashing down.


While 5G has been branded as the great enabler, unlocking a wealth of exciting new technologies and experiences, it has also presented cybercriminals with new opportunities to evolve their attack methods and gain access to a company’s infrastructure.


The COVID-19 pandemic has created even more challenges for CIOs and security teams, sparking a surge in cybercrime across the globe. Here, we take a look at some of the key cybersecurity trends to be aware of as we usher in the new, 5G-powered age, and how the pandemic has thrust these security issues into even sharper focus.


Zero Trust cybersecurity with 5G

While it always pays to approach cybersecurity with scrupulous detail, the industry has learned many lessons over the years that will put us in good stead when it comes to 5G security. Indeed, many of the key learnings from 3G and 4G security have already been embedded into the 5G architecture.


What’s more, security is the central pillar of the 3rd Generation Partnership Project (3GPP) – the collective of standard development organization for mobile telecoms – around which all its standards are built. This means a huge range of new capabilities and architecture concepts have been built into 5G, helping network transport be inherently more secure.

Despite all this, vulnerabilities will always exist. That’s why 5G also enables Zero Trust, which means no component of a network can execute any action or transmit any data to another entity without being authenticated and authorized.


Additionally, 5G incorporates comprehensive encryption standards and encryption methodologies, so data is secured and encrypted in transit. There’s no doubting that, despite the rise in cybercrime sparked by the COVID-19 pandemic, 5G is the most secure generation technology in history.


A new way of building security

Regardless of 5G’s robust security standards and Zero Trust approach, vulnerabilities will always exist. And while 5G doesn’t inherently create more risks, enterprises must be able to recognize the dangers associated with the new use cases that 5G enables, particularly around the proliferation of IoT and increasing connectivity between devices.


To meet these security issues head on, organizations must abandon the historical approach of building security from the bottom up. It’s time to flip this logic and build security capabilities with individual use cases in mind. By examining the risk exposure and worst-case scenarios of each use case, companies need to build security for each application, while enabling fast and effective capabilities. Effort should be proportional to the risk, meaning each use case should be treated differently.


There’s no doubting that 5G will enable a plethora of exciting new opportunities, but if security risks aren’t addressed, consumer trust will quickly erode and disappear. And businesses can’t build that consumer trust in the first place if they’re unable to demonstrate how they protect 5G-enabled environments.


The impact of COVID-19 on global cybersecurity

There’s no arguing that the pandemic changed everything – across every sector and industry imaginable. In terms of cybersecurity, if anything, the pandemic threw the need for a more robust security structure into even sharper context.


The remote nature of today’s workforce has exposed a multitude of new cybersecurity risks. For example, the widespread and rapid migration to cloud to enable remote working has resulted in a much broader attack surface for cybercriminals looking to find ways into an organization.

Pre-COVID-19, cybercriminals were successfully using tried and tested methods to penetrate businesses and obtain sensitive data. It goes without saying that if these tactics worked in a stable business environment, they’ve been working even better in an era of such disruption and uncertainty. Even tech giants like Microsoft, Facebook and Twitter have suffered attacks, alongside state and government services.


So far, we have seen three common threat methods increase throughout the pandemic:

Rise in human error: Faced with major disruption, increased workloads, and the distractions of a home-working environment, it’s no wonder that more individual, human errors have been reported during the pandemic.


Credential-related hacking: With large swathes of the working population requiring remote access and workstation maintenance, IT departments face the challenge of securing company assets on a corporate network while most of the workforce is out of the office. This has widened the number of remote access opportunities for cybercriminals.


Phishing for emotion: Phishing scams represent one of the go-to methods among hackers, but COVID-19 has seen a rise in phishing emails that take advantage of people’s emotions during such challenging times. In an attempt to exploit the uncertainty and fear that the pandemic created, there was a marked increase in phishing emails that contained the words ‘COVID’, ‘Coronavirus’, ‘masks’, ‘test’, ‘quarantine’ and ‘vaccine’.


Security lessons learned

5G brings opportunity and challenges in equal measure, especially around cybersecurity. And, while there’s no denying that the rise of new, 5G-enabled use cases will invite more cyberattacks, our ability to cope and adapt to the disruption and uncertainty of 2020 serves as a key learning moving forwards.


The pandemic helped us all realize that we can move quicker than we thought possible, and in security terms, it highlighted the need for a more robust – yet bespoke – cybersecurity infrastructure: an infrastructure that will serve the needs of a 5G-powered world, with security sitting at the very heart of it.



Empowering teams – 1Fix

Our team of specialists at 1fix offer a range of business IT services ranging from desktop to server management, to network design and cybersecurity assistance.


Our experts want to become a vital member of your team and help you integrate Microsoft 365 and its range of tools, features, and applications as one of the key parts of your IT infrastructure. We can help you achieve a level of communication with your employees -no matter their geographical location - that can rival any 100% on-premise workforce in the industry. Do not hesitate to contact the 1-Fix team for a conversation on any aspect of your IT.



News Source: https://www.techradar.com

Join Our Mailing List

All sign-ups are handled inline with our privacy policy and can unsubscribe at any time.

IT Support Services
Cybersecurity Deep-Dive
IT Cloud Migration Service

Recent Blogs

By Jess Dugdale 01 May, 2024
We won MSP of the Year 2024 (sub 1500 endpoints)!
By Craig Atkins 22 Apr, 2024
Are you tired of juggling IT issues while trying to focus on growing your business? It may be time to consider outsourcing your IT support. We've put together 5 reasons why outsourcing your IT can be beneficial for you...
By Grant Davis 03 Apr, 2024
In today’s fast-paced digital landscape, having an intelligent assistant by your side can make all the difference. Enter Microsoft Copilot, a powerful AI companion designed to boost productivity, spark creativity, and simplify complex tasks. Let’s dive into what makes Copilot a game-changer for individuals and businesses alike.
By Craig Atkins 27 Mar, 2024
We've finalists for not one, but two Network Group Awards 2024!
By Craig Atkins 22 Mar, 2024
World Backup Day is just around the corner so we thought we'd share a few reasons why backing up your computers regularly is so important.
By Craig Atkins 15 Mar, 2024
John Clark, from Solutions Shared joined us on a webinar to discuss what Microsoft Power Apps are and how they can be used in your business.
Show More
Share by: