May 17, 2020

Ensuring network security in the 5G era

Ralf Llanasas
4 min
How to maintain network security in the coming 5G era
5G technology is highly anticipated, but it also brings with it many network security challenges.

Technology such as devices connected to the Internet...

5G technology is highly anticipated, but it also brings with it many network security challenges. 

Technology such as devices connected to the Internet of Things (IoT), augmented reality (AR), virtual reality (VR), and others require a fast, reliable and extensive network to keep up the momentum of development. New businesses and new technologies working within the 5G era will be faced with new security and privacy challenges. 

Cybersecurity is already a major challenge for companies because of the large amounts of sensitive information stored on their database and server. With the increased connectivity that 5G brings, there will need to be increased security to make sure that those additional connections don’t weaken the network’s defense.

Image result for network security statistics

5G is an ultra-fast network with extremely low latency and significantly increased bandwidth capacity. According to Gartner, nearly 66% of organizations have already planned to deploy this next-generation technology by 2020. Businesses who want to keep up with modern advances will need to consider the role that 5G could have in updating the way their business functions. 

5G network security challenges

5G technology will accelerate the industries that utilise it, enabling a wide range of new advanced services. However, these services will then need to increase their security to combat potential weaknesses. For instance, in the context of automated vehicles, there is the potential for cyberattacks on these smart vehicles as their use becomes more widespread. To address this security challenge, the National Highway Traffic Safety Administration follows a multi-layered cybersecurity approach that will approve driver assistance technologies.

When it comes to the healthcare industry, the unique capabilities of 5G will lead to the significantly faster transfer of large patient files. It will enable remote surgery and remote patient monitoring with the help of IoT technology. 

However, these advancements require stronger security to handle threats such as medical identity theft, health privacy invasion, and other types of attack. According to a Wipro report, in 2017 40 percent of data threats were experienced by the healthcare industry. The growing use of IoT devices will make handling the cybersecurity risks even more challenging than ever before. 


5G security and new network architectures 

New cloud virtualisation technologies are thriving as 5G technology is growing in popularity. However, at the same time, there are several new security concerns. 

Technologies like software-defined networking (SDN) and network functions virtualization (NFV) are open, programmable, and flexible in nature. They introduce a new avenue of network security challenges. For instance, SDN’s network element such as the management interfaces could open it to attack. 

According to a study published in the Journal of ICT Standardization, a multi-pronged approach to 5G network security should include Authentication and Key Agreement (AKA) and trust models, among other strategies. 

Network infrastructure should also evolve following the adoption of 5G. For instance, because 5G networks can be comprised of uniquely purposed slices, each slice could require unique security capabilities according to their use cases. Compromised Radio Access Network (RAN)-side 5G devices cause pose a Distributed Denial of Service (DDoS) threat.

According to a technical report released by the Department for Digital, Culture, Media, and Sport in the United Kingdom, four crucial security mechanisms should be met. The first one is cross-layer security, which includes a uniform framework to coordinate various security methods, such as applications or the IoT. The second mechanism is end-to-end security, which suggests having a secure connection for the communication paths between the core network and end users. 

Cross-domain security is also critical in the 5G era. This new cellular technology creates a large number of unique use cases. The growing vertical market calls for a healthy collaboration between those involved in the 5G system to enact security solutions. Finally, as the network evolves, the secure-by-design requires security to be integrated with the design during development. 

5G security and privacy threats

The subject of 5G security challenges is capturing the attention of citizens, industry experts, telecommunication companies and governments. Information security is also a major concern for businesses undergoing a digital transformation. When, in the near future, the simplest prepaid phone plans could provide (and expose) the population’s phones to 5G networks, it’s not hard to see why.

It is vital that 5G security challenges are understood and ways to address them are identified. To succeed with 5G transformation, companies need to learn how to mitigate the potential risks. Accessing a safe and secure 5G demands a holistic view. For instance, communication between traffic encryption, user authentication, mobility, and network resilience aspects require detailed consideration. 

5G will inject technological development with a much needed upgrade that will have the potential to propel businesses forward into the future. 5G is not a problem to be avoided, it is a ground-breaking development to be embraced. However, at the same time, it is important to keep in mind the possible security concerns that come along with a connected future, and ensure network safety as people move forward. 

Share article

Jun 10, 2021

The Talent War for Skilled Tech Workers

Elise Leise
3 min
CIOs and recruiters battle over programmers, cybersecurity professionals, and cloud architects, as the need for skilled tech workers hits an all-time high

Post-pandemic, our biggest problem might be a lack of skilled tech talent. As companies move forward with their digital transformation plans, they aim to hire new staff and train their current employees. Out of 750 UK companies polled in a Studio Graphene digital report, 45% plan to hire new tech staff in the next 12 months and more than half (53%) intend to invest in training for their current workers. 


Companies are realising that their survival now depends on a limited pool of qualified technology workers. Among the hardest-hit economies are those in Brazil, Indonesia, and Japan, but even the United States and the UK will experience the squeeze. “It’s pure supply and demand”, said Alan Guarino, a Korn Ferry vice-chairman. “Companies are paying more...but there’s still a shortage of high-skilled workers. Technology is the thread that runs across every aspect of business”. 


Which Jobs Are In Demand? 

According to a 2021 IT salary report by Robert Half Technology, the most in-demand tech jobs of the year include information security professionals, cloud architects, database administrators, systems analysts, and DevOps engineers, among others. But in those fields, it’s difficult to find hires with significant experience, multiple specialisations, and a high level of expertise. And multinationals such as Google, Apple, and IBM usually scoop them up. 


Regardless of the exact role, companies need workers who can implement advanced security systems, target cloud and network vulnerabilities, document risk points and failures, and abide by new industry tech regulations. This will likely mean that companies start to take certifications like the ones pioneered by Google and Amazon, instead of insisting on four-year undergraduate degrees. 


But even as coding boot camps and year-long certification programmes have ramped up to try to close the gap, smaller tech firms and startups struggle to compete with their bigger counterparts. Remote work doesn’t help matters. “Hire-from-anywhere policies will only heat up a tight candidate market”, said Ryan Sutton, a district president of technology staffing services at Robert Half. “Companies who were already having a hard time recruiting are no longer just working against local competitors, but potentially desirable companies across the country”.


How Can CIOs Solve the Crisis? 

As governments try to do their part—Poland offers residency and potential citizenship to skilled tech workers, India offers broad IT, telecommunications, and cybersecurity programmes, and the Netherlands lets its foreign employees earn 30% tax-free income—company executives must take measures of their own. 


Some CIOs have started looking to other countries to source expert talent. In the United States, where 80% of U.S. employers state that tech recruiting is a significant challenge, some firms are looking to Mexico, where 20% of college graduates have engineering degrees. As a result, tech companies such as Cisco and Intel have sourced labour from both the U.S. and Mexico. 


To compete, here are some first steps: 


  • Invest in cybersecurity and cloud development training programmes 
  • Hire based on skills and expertise, not necessarily degrees
  • Outsource to other countries with high percentages of skilled engineers and programmers

Overall, companies that broaden their search for talent and upskill their current employees will be best equipped for digital transformation. As Ritam Gandhi, founder and director of Studio Graphene, said: “Our research shows that, on the whole, UK businesses have adopted a long-term mindset [towards] technology and innovation”.

Share article