- The combination of 5G and IoT devices can be a boon for businesses.
- But it increases the risk of incursions into your corporate networks with every device added.
- Here, experts advise how to tamp down the risks of integrating IoT devices into your 5G network.
- This article is part of “5G Playbook,” a series exploring one of our time’s most important tech innovations.
One of the benefits of 5G is that it enables a massive influx of devices to be connected to the internet, thanks to its superfast speeds and always-on reliability.
The technology enables more data transfers from more Internet of Things devices — which should, in theory, be a boon for businesses. But drawbacks come with so many connections. One-third of mobile service providers surveyed by Trend Micro said the combination of 5G and the Internet of Things resulted in an increased attack surface.
If you’re thinking of building an enterprise 5G network, consider these risks first.
1. Every new connected device is a security risk
Every IoT device that connects to a 5G network is a new entry point for cybercriminals attempting a breach. If they get in, they can wreak havoc on your system.
“IoT devices are appealing targets for cybercriminals because of their always-on nature,” Steve Jacques, a consulting engineer at Juniper Networks, told Insider. “That makes them susceptible to attacks.”
Jacques added: “Enterprises need to acknowledge the common security weaknesses in IoT at a device-security level, implementing measures such as no set default passwords and being more proactive in remediating potential security risks. This will reduce risk associated with IoT devices.”
2. IoT devices can integrate with the network — unless you segment them off
Another issue is that IoT devices integrate deeply with networks, passing data to and from your core network. But segmenting them from the rest of your network can mitigate that risk, Parm Sandhu, the vice president of enterprise 5G products and services at NTT Ltd., said.
“This way, additional security can be applied to the IoT-device traffic as it leaves the segment, allowing the enterprise to have more control over the access to and from these types of devices,” Sandhu said.
3. IoT devices can often be vulnerable and rarely update
One key issue with expanding the attack surface area for hackers by introducing more devices is that you increasingly rely on each of those devices being kept up to date. And traditionally, IoT devices have been lacking in that area compared with other items you may connect to a business network.
Because of their consumer focus, many IoT devices are not designed with security in mind and may contain vulnerabilities or weak default configurations. They’re also often not updated frequently, meaning that it’s increasingly possible to insert zero-day malware or backdoors into systems through them if those overseeing the network are not careful.
To mitigate this, only IoT devices that put security at their core should be used, and they should frequently be updated with firmware to keep them safe.
4. Devices are often granted too much permission by default
To make their setup easier, it can be tempting to set broad, liberal access for IoT devices when connecting to your 5G network. However, that can increase the risks your organization faces.
But there are steps you can take to avoid those issues, Jacques said. “The enterprise market can also protect itself against future breaches by implementing network-based security, such as granular access control and encryption for data in transit,” he said. Artificial intelligence and machine learning could also help by modeling user behavior and analyzing where there are anomalies that ought to be investigated.
Read the full article here