IoT and 5G: opportunities and risks for companies 

IoT and 5G: opportunities and risks for companies

Share post

Numerous companies are in the midst of digital change, which is also being driven to a large extent by the Internet of Things (IoT). However, IoT devices still have major security weaknesses, leaving organizations exposed to new cyber threats every day. Additionally, new technologies such as 5G have made IoT devices even more vulnerable to zero-day exploits and software tampering.

So, with the spread of IoT, what can organizations do to protect against such attacks? A comment by Sunil Ravi, Chief Security Architect Versa Networks.

IoT devices are a security risk

Telecom giant Ericsson estimates that by 2022 there will be nearly 1,5 billion cellular connected IoT devices. These are undoubtedly of crucial importance for the ongoing transformation of companies. Because their contribution to making the infrastructure "smarter" and collecting data for further developments in the field of machine learning and artificial intelligence is invaluable. However, the fundamental problem with IoT devices is their security. Networked devices often do not yet have any security functions, such as e.g. B. Authentication Controls. And as the market booms and companies expand their IoT portfolios, their attack surface also grows. With ransomware reports making headlines time and time again, organizations need to ensure that any devices added to their infrastructure are completely secure.

The Internet of Things (IoT) as a whole is not a well-researched area of ​​technology and experience has shown us that many threats can emerge from the unknown. The challenge becomes particularly clear when considering the scale of the IoT market. With so many devices with unlimited connectivity, it would be extremely difficult for researchers to review and categorize each one.

Attackers have been known to comb an organization from top to bottom in search of a suitable vulnerability. It is true that enterprise IT architectures are typically equipped with advanced and sophisticated security tools and policies that make them far more difficult to breach. But IoT devices that don't have the same level of security are perfect targets. Once under attack, they provide a platform for threat actors to launch their attack and move laterally through the infrastructure.

The impact of 5G

In the short time that 5G has been rolled out globally, it has become a natural fit for IoT devices. The massive increase in speed and capacity helps to meet the enormous demands such as utilizing networks and facilitating 5/XNUMX connectivity, not to mention the ability to meet the scaling needs for all IoT devices. XNUMXG is therefore the ideal starting point for changing enterprise networking and the connection of infrastructure environments, clouds and IoT devices.

However, software vulnerabilities are inevitable, and like the IoT market, 5G has not yet been sufficiently researched for experts to have 100% confidence in its security. Zero-day attacks therefore pose a massive threat to IoT and 5G applications. Just like the Internet, 5G is not a private network. As a result, when IoT devices connect to these networks, the attack surface increases and they become vulnerable to lateral movement.

Security and network performance must be in balance

Sunil Ravi, Chief Security Architect Versa Networks

Of course, security and network performance do not go hand in hand. If too much attention is paid to one, the other will suffer, resulting in significant operational and user experience impacts. There are countless mission-critical applications that depend on network performance, but that doesn't mean security comes second.

The key to achieving this balance is a focused approach. Solving the problem with just any security product is an ineffective method and is likely to result in a waste of money and time. Organizations need to address the specific issues presented by the Internet of Things and choose the service that offers the right level and form of security.

SASE can compensate for missing IoT functions

Secure Access Service Edge (SASE) has proven to be a valuable tool to compensate for the missing capabilities of the IoT. SASE tightens the interlocking of security and network performance, ensuring that all vulnerabilities are eliminated without distracting attention from network impairments. With this service, organizations can ensure that all endpoints in an IoT network—regardless of size—receive the same level of security and management features. In addition to assigning data access controls and using sandboxing to isolate and analyze suspicious connections, SASE helps improve connection speeds and reduce latency. The unified software stack eliminates the need for data to traverse different devices or virtual network functions (VNFs).

The IoT can contribute significantly to a company's resilience, so it is important for companies to protect their IoT ecosystem. That means they have to invest in security from the start and can't think of it as an optional add-on. While not every IoT device is secure from the start, organizations can ensure their entire network is watertight.

More at Versa-Networks.com

 


About Versa Networks

Versa Networks, the leader in SASE, combines comprehensive security, advanced networking, full-featured SD-WAN, true multi-tenancy, and advanced analytics over the cloud, on-premises, or a combination of both to address SASE needs from small to extreme to meet the requirements of large companies and service providers. Versa SASE is available on-premises, hosted through Versa-operated service providers, in the cloud and through Versa Titan, a simplified cloud service designed for IT Lean.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Vulnerabilities in medical devices

One in four medical devices (23%) has a vulnerability from the US cyber security agency CISA's Known Exploited Vulnerabilities (KEV) catalog. In addition, there are ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more