With the global rollout of 5G networks, their immense potential for accelerated workplace adoption is sure to attract increasing attention. However, are concerns about 5G security justified, especially in the early stages of enterprise-wide 5G implementation?
As one of the most revolutionary technologies of the digital age, 5G technology has demonstrated enormous potential. With vendors beginning to deploy 5G networks globally, the global 5G infrastructure market is projected to exceed $42 billion by 2025.
From ultra-high-definition streaming to enhanced sensor detection for utility companies, 5G has the potential to have a profound impact on sectors such as entertainment, energy, communications, and manufacturing. While the true transformative potential of 5G remains uncertain—the most creative and innovative applications will emerge once cellular technology is firmly established—the combination of ultra-high network speeds and hyper-mobility could fundamentally change the way we work.
"The phenomenal increase in bandwidth supported by 5G technology will have a huge impact on everything cloud-related, allowing users and devices to use virtually any cloud application, anywhere," cloud security expert and iboss CEO Paul Martini told TechHQ. However, the rise of 5G will also "disrupt the traditional scope of the office."
“Before the advent of 5G and cloud technology, the office area was a building where users worked. Now, with 5G technology, the office perimeter will become the users and the devices themselves,” Martini told us. While this can provide more freedom and flexibility in how businesses and workers operate, the increased mobility also brings unique challenges to organizations.
In the 5G era, users are no longer confined to Wi-Fi networks. This decentralization of networks requires administrators to reassess how users access organizational documents and perform business tasks. Martini says, "To give an analogy, some organizations used to build castles and moats around their buildings with security equipment." "The problem is that people are no longer working in castles."
Martini believes that the rise of 5G will ultimately mark the end of network boundaries—which will impact how businesses must build themselves to defend against security threats.
Today, employees have access to more information at any time than ever before, meaning traditional cybersecurity measures are no longer effective. The increased bandwidth provided by 5G, along with wider access to ultra-fast connections, offers attackers a larger surface area and enables them to carry out attacks more effectively—therefore, users and devices outside the office will be more vulnerable than ever before.
According to data from the UK-based cybersecurity organization Information Risk Management, 83% of cybersecurity leaders across industries claim to be “troubled” by the increased risks brought by 5G connectivity. Organizations must then consider the security challenges in a more holistic way; as Martini points out, the concept of “building a moat around a castle” is not a sufficient model – instead, 5G connectivity will require businesses to double down on protecting the boundaries of external users and devices at their offices.
Martini said, "That's why it's crucial to shift design patterns from security strategies designed for fixed structures (like cybersecurity devices) to cybersecurity strategies used in the cloud, wherever users go." In late 2019, EU member states released a joint risk assessment report on 5G technology, advocating for new approaches to address the multidimensional security challenges of next-generation networks.
5G strategists and industry insiders recommend developing end-to-end security in networks to address the aforementioned security concerns. Take network slicing as an example: each "service category" has its own distinct network requirements. By doing so, each "service category" will have its own virtual network slice, specifying data transmission over high bandwidth and ultra-low latency without impacting other services.
As we move toward a business future of 5G connectivity, the most forward-thinking companies are poised to gain unrestricted access to applications. However, every investment in 5G's potential must be matched by an investment in equally complex and comprehensive security.