In Focus: Megatrends  

What advisers need to know about 5G

  • To learn about 5G technology and its capabilities
  • To understand the risks stemming from 5G technology
  • To learn how to protect your business from cyber risks stemming from 5G
CPD
Approx.30min

This is by no means an exhaustive look at 5G, nor the potential pitfalls that may accompany the new technology.

We set out to address the question of whether 5G is a security risk and while it certainly is, most of us will not consider it more of a risk than the internet in general. 

Article continues after advert

There are a lot of incredibly talented people working on the 5G standard, incorporating the lessons learned from 4G and previous generations to make 5G as secure as possible from the outset.

Similarly, the manufacturers providing the hardware for the 5G core, and the software that will run on it to define the new 5G networks, will be putting considerable effort into securing their products.

However, as is often the case with any new technology, there will likely be issues that come to light only after the systems are in place and being subjected to real world conditions.

Protecting your business

The good news is that many of the systems and processes you would put in place to mitigate the risk posed to your business by the internet in general are equally applicable to 5G, including backing up your data; keeping your operating system and other software up-to-date; having a current anti-virus or endpoint protection program running; being mindful of suspicious emails and links; using multi-factor authentication for account access where possible; and keeping end-user devices (PCs, laptops, tablets and mobile devices) safe, etc. 

Many financial advisers now use cloud-based services (remote access services that exist on the internet). The above is equally applicable to cloud services since the responsibility for securing resources in the cloud is not solely undertaken by the provider. 

Businesses must, of course, remain alert at all times to cyber resilience and security.

Cyber criminals are adept at identifying and exploiting vulnerabilities. It is important that you understand your technology and how it operates within your business.

Ask yourself:

  • Do you keep an up-to-date list of all devices used within your business?
  • Do you have a list of all software and firmware used on devices within your business?
  • Do you use any virtualisation software (cloud services are based on virtualisation software)?

If your staff can access your information anywhere, cyber criminals can access it too. It is vital that these services are set up correctly and have the correct security controls in place. 

Accessing support

There is no one-size-fits-all solution to cybersecurity but the cyber essentials framework from the UK National Cyber Security Centre is an excellent starting point for businesses wishing to review or improve their cyber security posture.

Cyber essentials is a government-backed scheme to help protect businesses of all sizes and across all sectors, against a range of the most common cyber attacks.