Skip to main content

Businesses are set to spend billions on securing their 5G networks

Web Hosting & Remote IT Support

Despite the widespread opinion that private 5G networks are secure by default, most enterprises are sceptical, and would rather invest a portion of their IT budget on securing the new, promising technology. 

New research from Trend Micro has revealed businesses are ready to set aside quite a hefty part of their budget on this endeavor. 

After interviewing 150 enterprises with 5,000+ employees, the majority of which already deployed private 5G networks, Trend Micro found that most enterprises invest 5-10% of their IT budgets specifically on the security of this type of network. 

3GPP

Furthermore, for the vast majority (72%), the 3GPP approach to security will suffice. For the uninitiated, 3GPP refers to the use of 3GPP standards and technical specs for implementing and deploying private networks. However, Trend Micro says that 3GPP architecture isn’t impenetrable to determined attackers. 

The majority of the respondents were interested in security visibility (75%), followed by risk and control management (65%), and an improved and streamlined alerting system (49%). To get there, most are requiring authentication (75%), access controls (65%), and protection from fake base stations (58%). 

These findings, the researchers suggest, hint that business leaders are looking to focus on integrating and enhancing the visibility of security measures throughout their organizations. Implementation leaders, on the other hand, are focusing more on security standards elevation. 

"When it comes to private 5G network technology, there's no such thing as 'secure by default,' so it's reassuring that enterprises are looking to add their own protections,” commented Greg Young, vice president of cybersecurity at Trend Micro. “What will be crucial going forward is educating this new user base about where the most critical security gaps are and what a shared responsibility model will look like in these environments."

The shared responsibility model, in which not all components need to be secured by service providers, is important for a proper security posture, Trend Micro’s researchers further claimed. Organizations should also be responsible for mitigating risk in certain parts of the environment. Finally, market education and bridging the gap in perceptions will be crucial in the future, particularly as there’s an acute lack of awareness about security vendor solutions.



via Hosting & Support

Comments

Popular posts from this blog

This new malware campaign can hijack your Gmail or Outlook email account

Web Hosting & Remote IT Support Cybersecurity researchers from Cisco Talos have spotted a new hacking campaign they claim is targeting victims’ sensitive data, login credentials, and email inboxes. Horabot is described as a botnet that has been active for almost two and a half years now (first spotted in November 2020). During that time, it’s mostly been tasked with distributing a banking trojan and spam malware .  Its operators seem to be located in Brazil, while its victims are Spanish-speaking users located mostly in Mexico, Uruguay, Venezuela Brazil, Panama, Argentina, and Guatemala. Horabot botnet The victims are found in different industries, from investment firms to wholesale distribution, from construction to engineering, and accounting. The attack starts with an email message carrying a malicious HTML attachment. Ultimately, the victim is urged to download a .RAR archive, which holds the banking trojan.  The malware is capable of doing plenty of things: stealing l

Want to store 1PB of data in the cloud? This startup can do it for you for as little as $10,000 a month — Qumulo says it can scale to Exabytes off premise and wants to eradicate tapes once and for all

Web Hosting & Remote IT Support Qumulo has launched Azure Native Qumulo Cold (ANQ Cold), which it claims is the first truly cloud-native, fully managed SaaS solution for storing and retrieving infrequently accessed “cold” file data. Fully POSIX-compliant and positioned as an on-premises alternative to tape storage, ANQ Cold can be used as a standalone file service, a backup target for any file store, including on-premises legacy scale-out NAS, and it can be integrated into a hybrid storage infrastructure, enabling access to remote data as if it were local. It can also scale to an exabyte-level file system in a single namespace. “ANQ Cold is an industry game changer for economically storing and retrieving cold file data,” said Ryan Farris, VP of Product at Qumulo. “To put this in perspective with a common use case, hospital IT administrators in charge of PACS archival data can use ANQ Cold for the long-term retention of DICOM images at a fraction of their current on-premises leg

No light without dark : making the most of ‘shadow IT’

Web Hosting & Remote IT Support In the last few decades, technology has created a modern digital workforce that is technically skilled and adept at finding innovative solutions that would help them succeed at work. However, with 95% of employees struggling with digital friction in the workplace - including a lack of access to the right tools - ambitious employees who are hungry for results have often needed to explore fixes outside the scope of existing systems provided by their employers. On top of that, the popularity of cloud-based apps has resulted in business processes often ending up fragmented across various systems, requiring workers to devote time to manual maintenance. This has accelerated the spread of (the unnecessarily ominous sounding) ‘shadow IT’, or applications that savvy workers use without official authorization to help them bypass limitations and get work done. In a perfect world, a balance can be struck between giving these technically skilled workers freed