Blog Layout

Dealing with cybersecurity in a 5G, post-COVID future

Chris Lunn • March 29, 2021

The impact of 5G and COVID-19 on the security landscape

Cybersecurity in a 5G, post-COVID future


The threat from cybercriminals is omnipresent and unceasing. Their approach to cybercrime is becoming increasingly sophisticated. Their tools, techniques, and technologies are evolving at rapid speeds. And they need only expose one weakness in an organization’s defenses, and the walls can come crashing down.


While 5G has been branded as the great enabler, unlocking a wealth of exciting new technologies and experiences, it has also presented cybercriminals with new opportunities to evolve their attack methods and gain access to a company’s infrastructure.


The COVID-19 pandemic has created even more challenges for CIOs and security teams, sparking a surge in cybercrime across the globe. Here, we take a look at some of the key cybersecurity trends to be aware of as we usher in the new, 5G-powered age, and how the pandemic has thrust these security issues into even sharper focus.


Zero Trust cybersecurity with 5G

While it always pays to approach cybersecurity with scrupulous detail, the industry has learned many lessons over the years that will put us in good stead when it comes to 5G security. Indeed, many of the key learnings from 3G and 4G security have already been embedded into the 5G architecture.


What’s more, security is the central pillar of the 3rd Generation Partnership Project (3GPP) – the collective of standard development organization for mobile telecoms – around which all its standards are built. This means a huge range of new capabilities and architecture concepts have been built into 5G, helping network transport be inherently more secure.

Despite all this, vulnerabilities will always exist. That’s why 5G also enables Zero Trust, which means no component of a network can execute any action or transmit any data to another entity without being authenticated and authorized.


Additionally, 5G incorporates comprehensive encryption standards and encryption methodologies, so data is secured and encrypted in transit. There’s no doubting that, despite the rise in cybercrime sparked by the COVID-19 pandemic, 5G is the most secure generation technology in history.


A new way of building security

Regardless of 5G’s robust security standards and Zero Trust approach, vulnerabilities will always exist. And while 5G doesn’t inherently create more risks, enterprises must be able to recognize the dangers associated with the new use cases that 5G enables, particularly around the proliferation of IoT and increasing connectivity between devices.


To meet these security issues head on, organizations must abandon the historical approach of building security from the bottom up. It’s time to flip this logic and build security capabilities with individual use cases in mind. By examining the risk exposure and worst-case scenarios of each use case, companies need to build security for each application, while enabling fast and effective capabilities. Effort should be proportional to the risk, meaning each use case should be treated differently.


There’s no doubting that 5G will enable a plethora of exciting new opportunities, but if security risks aren’t addressed, consumer trust will quickly erode and disappear. And businesses can’t build that consumer trust in the first place if they’re unable to demonstrate how they protect 5G-enabled environments.


The impact of COVID-19 on global cybersecurity

There’s no arguing that the pandemic changed everything – across every sector and industry imaginable. In terms of cybersecurity, if anything, the pandemic threw the need for a more robust security structure into even sharper context.


The remote nature of today’s workforce has exposed a multitude of new cybersecurity risks. For example, the widespread and rapid migration to cloud to enable remote working has resulted in a much broader attack surface for cybercriminals looking to find ways into an organization.

Pre-COVID-19, cybercriminals were successfully using tried and tested methods to penetrate businesses and obtain sensitive data. It goes without saying that if these tactics worked in a stable business environment, they’ve been working even better in an era of such disruption and uncertainty. Even tech giants like Microsoft, Facebook and Twitter have suffered attacks, alongside state and government services.


So far, we have seen three common threat methods increase throughout the pandemic:

Rise in human error: Faced with major disruption, increased workloads, and the distractions of a home-working environment, it’s no wonder that more individual, human errors have been reported during the pandemic.


Credential-related hacking: With large swathes of the working population requiring remote access and workstation maintenance, IT departments face the challenge of securing company assets on a corporate network while most of the workforce is out of the office. This has widened the number of remote access opportunities for cybercriminals.


Phishing for emotion: Phishing scams represent one of the go-to methods among hackers, but COVID-19 has seen a rise in phishing emails that take advantage of people’s emotions during such challenging times. In an attempt to exploit the uncertainty and fear that the pandemic created, there was a marked increase in phishing emails that contained the words ‘COVID’, ‘Coronavirus’, ‘masks’, ‘test’, ‘quarantine’ and ‘vaccine’.


Security lessons learned

5G brings opportunity and challenges in equal measure, especially around cybersecurity. And, while there’s no denying that the rise of new, 5G-enabled use cases will invite more cyberattacks, our ability to cope and adapt to the disruption and uncertainty of 2020 serves as a key learning moving forwards.


The pandemic helped us all realize that we can move quicker than we thought possible, and in security terms, it highlighted the need for a more robust – yet bespoke – cybersecurity infrastructure: an infrastructure that will serve the needs of a 5G-powered world, with security sitting at the very heart of it.



Empowering teams – 1Fix

Our team of specialists at 1fix offer a range of business IT services ranging from desktop to server management, to network design and cybersecurity assistance.


Our experts want to become a vital member of your team and help you integrate Microsoft 365 and its range of tools, features, and applications as one of the key parts of your IT infrastructure. We can help you achieve a level of communication with your employees -no matter their geographical location - that can rival any 100% on-premise workforce in the industry. Do not hesitate to contact the 1-Fix team for a conversation on any aspect of your IT.



News Source: https://www.techradar.com

Join Our Mailing List

All sign-ups are handled inline with our privacy policy and can unsubscribe at any time.

IT Support Services
Cybersecurity Deep-Dive
IT Cloud Migration Service

Recent Blogs

Image of a keyboard with a padlock on top
By Lee Dugdale-Shutts February 10, 2025
Data loss can occur due to various reasons, including hardware failures, cyberattacks, natural disasters, and human error. To protect your business from these risks, it's crucial to implement a strong data backup and security strategy.
Photo of someone writing notes whilst putting money in a savings jar.
By Craig Atkins February 6, 2025
While technology is essential for a successful business, it can also be a significant expense. Fortunately, there are several strategies you can implement to reduce IT costs without compromising on quality or performance.
Hologram of a cloud in front of an office building
By Craig Atkins February 3, 2025
Businesses are constantly faced with decisions about how to best manage their IT infrastructure. One of the most significant choices is whether to adopt cloud services or stick with on-premises solutions. Both options have their advantages and drawbacks, and the right choice depends on your business's specific needs and goals. Let's explore the key differences between cloud services and on-premises solutions to help you make an informed decision.
Photo of building blocks saying Problem and Solution with some hands either side
By Tom Dugdale-Shutts January 29, 2025
Nowadays, businesses rely heavily on technology to operate efficiently and stay competitive. However, with the increasing dependence on IT systems, businesses also face a myriad of IT issues that can disrupt operations and impact productivity.
Photo of a computer keyboard with a written password on a post it note on top.
By Ben Somner January 27, 2025
One of the most effective tools to protect your business against cyber attacks is a password manager. But what exactly is a password manager, how does it work, and why is it essential for your business?
Photo of someone typing on a laptop with a padlock and the words 'cyber security' on the screen
By Grant Taylor-Davis January 23, 2025
One of the most effective ways to protect your organisation from cyber threats is through Security Awareness Training. But what exactly is Security Awareness Training, how does it work, and why is it essential for your business? Let's explore these questions with a focus on KnowBe4, a leading platform in this field.
Show More
Share by: