{"id":15282,"date":"2019-05-09T09:10:09","date_gmt":"2019-05-09T17:10:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/09\/news-9031\/"},"modified":"2019-05-09T09:10:09","modified_gmt":"2019-05-09T17:10:09","slug":"news-9031","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/09\/news-9031\/","title":{"rendered":"How 5G could impact cybersecurity strategy"},"content":{"rendered":"<p><strong>Credit to Author: Kayla Matthews| Date: Thu, 09 May 2019 16:00:00 +0000<\/strong><\/p>\n<p>With the recent news that South Korea has rolled out the world\u2019s first 5G network, it\u2019s clear that we\u2019re on the precipice of the wireless technology\u2019s widespread launch. <\/p>\n<p>Offering speeds anywhere from 20 to 100 times faster than 4G long-term evolution (LTE), the next generation of wireless networks will also support higher capacities of wireless devices. That\u2019s a huge deal considering the <a rel=\"noreferrer noopener\" aria-label=\"rise of IoT (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/\" target=\"_blank\">rise of IoT<\/a> and similar technologies, all of which require a high-speed, active connection.<\/p>\n<p>But along with the network upgrade\u2014which will surely bring with it a boost in users relying on wireless frequencies\u2014there are security concerns, some new. <\/p>\n<p>Lucky for South Korea, this is something the local telecom companies <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.reuters.com\/article\/southkorea-5g-idUSL3N21K114\" target=\"_blank\">are not so concerned with<\/a>. Park Jin-Hyo, head of SK Telecom\u2019s Information and Communication Tech Research Center says, \u201cI don\u2019t think we have a security issue in South Korea.\u201d <\/p>\n<p>However, the reality is that 5G introduces a variety of new cybersecurity concerns, particularly when it comes to intensified attacks. <\/p>\n<p>As more and more devices are powered on and synced up, each one becomes a potential security vulnerability for the wider network. More specifically, many organizations will have to change or restructure their cybersecurity strategies to deal with the new platform.<\/p>\n<p>Here are four ways that the rise of 5G can and will impact a company\u2019s cybersecurity.<\/p>\n<h3>1. New risks will surface<\/h3>\n<p>In 2016, an incredibly dangerous denial-of-service (DDoS) attack took down most of the Internet on the US east coast. Initially, authorities believed that a certain hostile nation-state was responsible, targeting the country with nefarious ideations. As it turns out, the Mirai botnet was actually to blame, and it involved thousands of insecure IoT devices, including security cameras and similar tech.<\/p>\n<p>More alarming is the fact that its creator originally only developed the system <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html\" target=\"_blank\">to take down rival Minecraft servers<\/a> as a means to make some extra cash. The original intention was never to unload on the Internet as a whole, which shows that not all cybersecurity problems stem from mastermind criminals.<\/p>\n<p>What does any of this have to do with 5G? Anything and everything. As soon as 5G networks are rolled out to the greater public, devices will be powered on and connected from a variety of mediums. <\/p>\n<p>Everything from smart home security cameras to smart refrigerators to industrial-grade smart sensors can and will tap into the higher-performance networks. That presents a whole slew of new devices, tools, and systems that hackers can use to their advantage. From there, it\u2019s not a stretch to predict another botnet will rise, one that targets vulnerable and insecure devices, which would mean we\u2019ll see another series of attacks like the Mirai event.<\/p>\n<h3>2. More devices will necessitate smarter security solutions<\/h3>\n<p>As more devices are introduced, the security landscape becomes broader than ever before. Where once cybersecurity was concerned with internal computers and machines and a handful of authorized mobile devices, it is now expanded to include every possibility.<\/p>\n<p>Install smart coffee makers in the company office? There needs to be a new set of security solutions administered to protect any incoming and outgoing connections related to that device. Install new machine sensors and remote-operation tools for industrial equipment? The same is true.<\/p>\n<p>Security solutions will need to become just as broad to account for all the new network channels and devices, as a means to protect an entire operation. Not only will this facilitate new security requirements\u2014like outsourcing to a more capable provider\u2014but it will also have sweeping implications on the privacy and security of organizations as a whole. <\/p>\n<p>Take that smart coffee maker, for instance. One might not think it\u2019s transmitting or sharing sensitive data\u2014it\u2019s a simple coffee maker. But that doesn\u2019t matter. Hackers could reverse engineer the device to serve more nefarious purposes. For example, they could tap into a microphone which should be used for voice commands and use it to spy on sensitive communications or events.<\/p>\n<h3>3. Increased bandwidth will raise capability concerns<\/h3>\n<p>Many security solutions involve monitoring traffic in real time to identify potential threats based on activity and sniffed data. Someone in-house visiting a flagged URL, for example, might reveal an inside man, so to speak. They might also discover that a device or machine has been infected, which warrants further investigation.<\/p>\n<p>In any case, these systems are largely able to keep up because of bandwidth limitations. The Internet bandwidth or capacity of a network can only handle so much traffic at once. This is bad in terms of user performance but good in terms of managing security and traffic. With 5G, which offers incredibly higher speeds and capacity, all of that goes out the window.<\/p>\n<p>Security solutions must be upgraded to deal with these new capabilities, particularly when it comes to monitoring, encryption, and prevention\u2014the latter being handled by firewalls. A majority of legacy solutions may no longer work because of the increased capacity, speeds, and overall latency boost that 5G offers. <\/p>\n<p>The frightening element is that because we have no 5G networks around today to test, no one truly knows what the network upgrade is going to require of security professionals. To achieve the higher capabilities, hardware will need to be upgraded to become more powerful, and the solutions themselves may need to be redeveloped to deal with the state of networks. What that looks like exactly, we won\u2019t know until 5G is here.<\/p>\n<h3>4. Integration and automation will be a must<\/h3>\n<p>We\u2019ve been on <a href=\"https:\/\/www.infosecurity-magazine.com\/magazine-features\/rise-machines-cognitive-computers\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the verge of widespread security automation<\/a> for some time. The current landscape has helped push the need for it, as organizations must be ready to deal with security threats at all hours of the day and night.<\/p>\n<p>But integration has been optional, at least until recently. Integration simply means that the security architecture and system in use is connected across the entire operation. Data must correlate and sync even between security layers, and that\u2019s true whether those divides are physical or digital in nature.<\/p>\n<p>For example, someone trying to force their way inside a physical security facility should be flagged, and any further data that is related to their actions should be monitored digitally. That same person might try to find another way inside company infrastructure, including using various digital or physical systems and vulnerabilities. But integration extends beyond this quick example. Security data and the overall architecture must be evolved to handle the same kinds of threats that are developing in the real world. <\/p>\n<p>A digital-centric hacker might move to physical means and vice versa, at any time. They might use a combination of strategies and attacks to gain unauthorized access\u2014as they&#8217;re already showing with Emotet&#8217;s polymorphic, multiple module attacks or CrySIS ransomware&#8217;s versatile attack vectors. They will constantly be looking for ways in, which requires using automation to keep things running during the off-hours, too.<\/p>\n<h3>5G is coming<\/h3>\n<p>Advanced 5G and wireless networks are coming, and they will bring a huge selection of benefits, including higher traffic capacities, lower latency, and increased reliability. Naturally, that means more people and more organizations will rely on the new system for their devices.<\/p>\n<p>Unfortunately, it also introduces a slew of cybersecurity concerns and problems, particularly as it relates to current security solutions. <\/p>\n<p>Organizations will need to be prepared and should already have plans in place to upgrade and augment their existing security solutions. Failing to do so could have serious implications, not just for the organization itself but for the world at large. Sensitive data pertaining to the company and its customers could be stolen, and vulnerable devices could be used for nefarious deeds\u2014just like we saw with Mirai botnet.<\/p>\n<p>As we inch ever closer to the launch of next-gen wireless, we must continue to ask ourselves if we are truly prepared.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/how-5g-could-impact-cybersecurity-strategy\/\">How 5G could impact cybersecurity strategy<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/how-5g-could-impact-cybersecurity-strategy\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Kayla Matthews| Date: Thu, 09 May 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2019\/05\/how-5g-could-impact-cybersecurity-strategy\/' title='How 5G could impact cybersecurity strategy'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/05\/shutterstock_1290770686.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>With 5G wireless on the horizon, what will businesses need to do to secure their devices and networks?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/5g\/\" rel=\"tag\">5G<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/5g-wireless\/\" rel=\"tag\">5G wireless<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/automation\/\" rel=\"tag\">automation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-strategy\/\" rel=\"tag\">cybersecurity strategy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/integration\/\" rel=\"tag\">integration<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet\/\" rel=\"tag\">internet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mirai\/\" rel=\"tag\">mirai<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mirai-botnet\/\" rel=\"tag\">Mirai botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/networks\/\" rel=\"tag\">networks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wireless\/\" rel=\"tag\">wireless<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wireless-technology\/\" rel=\"tag\">wireless technology<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2019\/05\/how-5g-could-impact-cybersecurity-strategy\/' title='How 5G could impact cybersecurity strategy'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/05\/how-5g-could-impact-cybersecurity-strategy\/\">How 5G could impact cybersecurity strategy<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,18063,21768,6148,16293,21002,4314,10400,12363,12358,14922,21769],"class_list":["post-15282","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-5g","tag-5g-wireless","tag-automation","tag-cybersecurity-strategy","tag-integration","tag-internet","tag-mirai","tag-mirai-botnet","tag-networks","tag-wireless","tag-wireless-technology"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15282"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15282\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15282"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}