5G Insights IoT Opportunities Vulnerabilities

Compromised devices may provide malicious actors with 5G network access to intercept data that routes through the devices, the CISA researchers went on to say. Even though a U.S. network might appear secure, data traveling across countries may pass through untrusted telecommunication networks. These vulnerabilities will be difficult for enterprises to detect. Habits of the ‘Always’ Connected Worker Gary Audin September 20, 2019 How connected are we? Wilson Electronics tries to find out in their latest survey. Proprietary 5G equipment can be difficult to update and repair. Poor written code can lead to unsupportable software. Limited interoperability between networks can delay or increase the cost deployment. Fewer OptionsThe report also mentions that untrusted 5G equipment makers are less likely to be involved with interoperability testing. This can make it difficult to ensure that their untrusted products are comparable to those from trusted providers, limiting competition. Here are a few factors to consider: Working_Cell.jpg Again, be sure to talk to your network provider about its 5G network strategy and any concerns you might have.Tags:News & Views5GInternet of Thingsconnected devicessmall cellsNetwork Securityenterprise deploymentMobilityEnterprise NetworkingInternet of ThingsSecurity Articles You Might Like What Should You Do?If you’re looking at future in which 5G provides your IoT connectivity, you need to investigate the security efforts of your network provider. Ask questions about its suppliers. What liabilities will the provider accept if any? Look into what your 5G endpoints can implement to compensate for the potential 5G providers security problems. Most of the hype around 5G networks comes from its ability to improve speeds, as well as its potential to support the growing number of Internet of Things (IoT) devices in need of constant and consistent connectivity. However, security vulnerabilities are likely to surface in supply chains and on the network, according to a newly published Cybersecurity and Infrastructure Security Agency (CISA) key findings report. Technology Deployment5G small cell towers will reside on trees, light poles, homes, building corners, and retail shops. This provides more physical access points for malicious behavior, and the ability to intercept data and introduce denial-of-service attacks. According to the report, compromised small cells may produce the capability to clone devices, thereby replicating calls, use data, and add charges. Mobile Voice, Data, Text: Unlimited for $20 a Month?! Michael Finneran September 19, 2019 Calling itself an ‘infrastructure-based MVNO,’ cable operator Altice sets new price point for cellular service. CBRS: A Threat to Wi-Fi? Gary Audin September 27, 2019 Have enterprises unjustly dismissed Citizens Broadband Radio Service in favor of Wi-Fi? See All in Mobility » Dissecting Microsoft’s ‘Discovery’ of Firstline Workers Michael Finneran September 24, 2019 The mobile field is rife with meaningful examples of business process automation. Can Microsoft be a factor? The CISA report highlights that “5G technologies will be … overlaid on the existing 4G Long-Term Evolution (LTE) network that [already have] legacy vulnerabilities.” Security settings, permissions, and specifications from an untrusted core network may block 5G device security. Log in or register to post comments Supply Chain VulnerabilitiesAccording to the CISA report, untrusted partners can manipulate 5G products manufactured by trusted suppliers, creating vulnerabilities like counterfeit components or malicious software/hardware. In addition, when a trusted company buys 5G components from overseas production facilities, supply chain risks may crop up. Network SecuritySecurity updates don’t guarantee that there will be no more security fixes. An update itself can open a new vulnerability window. Don’t Count Dish Out Yet Dave Michels August 08, 2019 With the T-Mobile/Sprint merger on, Dish has an opportunity to become a major cellular provider.

Leave a Reply

Your email address will not be published. Required fields are marked *