Ruchir Shukla, MD, SafeHouse Tech | Jobs Reply

5G could pose a huge cybersecurity risk: Ruchir Shukla, MD, SafeHouse Tech

Ruchir Shukla is managing director at safe house Tech, an Indian-Israeli cybersecurity company. Over the past 5 years he has played a pivotal role in accelerating the growth of the company and establishing sustainable sales and operational channels for SafeHouse in India, expanding the company’s reach to actively sell in over 700 Indian cities and product sales worth over 100 crore in less than 2 years. Ruchir holds Bachelors and Masters degrees from IIT Kharagpur. In an interaction with Times of India Tech-Gadgets Now, Shah discusses the security risks involved 5G Posing and what both smartphone users and businesses can do.

Q. What is the biggest threat 5G poses?
With the launch of 5G network in India, the internet speed will be significantly faster with low latency, resulting in more and more internet access. However, it will also lead to some serious security vulnerabilities in the form of cyber threats like denial of service, massive botnet attack and so on. Considering that 5G architecture is a new development in the industry, it can bring us a variety of network attacks we may not be aware of.

As excited as we are to experience fast internet, cybercriminals will also take advantage of the high speeds of 5G to innovate and launch larger network attacks and spread malware faster than ever. Another aspect here is our growing reliance on IoT devices, ranging from our smartwatches to home appliances like refrigerators and air conditioners. We have moved to using smart devices without knowing the potential risks and vulnerabilities that attackers/cyber criminals can use to gain access. While 5G will be a driving change in IoT as more devices are connected, it would also lead to more security breaches. The advent of 5G could pose a cybersecurity risk as network connectivity is not encrypted, resulting in device details being exposed and allowing hackers to easily intercept data for device-specific IoT-oriented attacks. 5G security is cumbersome, it would require protection of the main network, endpoints, and devices connected to the network. Therefore, it is of paramount importance for companies to develop different approaches to end-to-end security not only for companies but also for individual users.

Another threat I see is that attackers could use 5G-related offers or services to perform phishing or OTP fraud by sending fake emails or messages pretending to offer a 4G to 5G upgrade . These messages might use fake logos and brands to appear legitimate, and they might contain links or attachments designed to trick the victim into providing confidential information or installing malware.

Q. What do you think telcos need to do to protect users?
While advanced connectivity and new architecture will drive IoT in telcos, telcos will also face risks and vulnerabilities that they may not know how to manage. 5G will raise more security concerns, prompting telcos to change their strategies to ensure maximum network security for consumers. These concerns require a shift toward more automated security processes, orchestration capabilities, security-centric methodologies, and flexible security services. These companies should also consider a different security-focused approach with more improvements than 4G as they plan their move to 5G. It goes without saying that 5G networks will bring new security requirements and to cope with these, telecom companies would need to step up and support policymakers where needed.

Another key consideration for telcos is leveraging DevSecOps with more momentum for security and operational capabilities. This will help telcos implement IT concepts of network security and a more secure software development approach. In addition, telcos can also work with governments and other organizations to develop and implement industry-wide standards and best practices for 5G security. This can help ensure that all organizations are taking steps to protect against potential threats and that the entire 5G ecosystem is secure.

Total protects against 5G threats will require a combination of technical measures, industry collaboration and constant vigilance to ensure the benefits of 5G technology can be realized without compromising user data and privacy.

Q. Any do’s and don’ts you think users should follow?
Keep your devices and software up to date: Don’t ignore device updates. Update in a timely manner to ensure you have the latest security patches and features that can protect against known vulnerabilities.

Use a reputable security solution: This will help protect your devices from malware, block malicious websites for you, identify apps that might be suspicious or potentially harmful, and issue warnings before you download them. Additionally, it offers you a safe browsing experience and protects you from scams and other online threats. Be careful when clicking links and installing software or apps: Do not click links or download files, apps and software from sources you do not trust as they may be malicious. There are chances that your device is infected with malware and causing a variety of problems such as: B. crashing your device and stealing your personal information.

Don’t use public WiFi networks unsecured: Public WiFi networks are often unsecured, so it’s important to use a VPN or other security measures when accessing them. The VPN-enabled encrypted connection protects your data from being intercepted by hackers.
Use longer passwords: Don’t use weak or easy-to-guess passwords for your accounts and devices, as they can be easily hacked. Instead, use strong passwords with a mix of letters, numbers, and special characters. Avoid obvious things like your name, date of birth or common words that are easy to guess.

Don’t fall for offers that seem too good to be true: be wary of offers that seem incredible. If someone offers you a free 5G upgrade or a great deal on 5G services, verify the offer before giving them any personal information or money.

Q. What types of threats related to 5G connectivity do you see?
As 5G networks are expected to be faster and more efficient than previous generations of cellular technology, they will enable new applications and services that were previously not possible. That means 5G networks are likely to be a target for cyber attackers looking to exploit vulnerabilities in the technology.

Potential threats and challenges related to 5G networks include:

Malware and ransomware attacks: As 5G networks become more widespread, they are likely to become targets of malware and ransomware attacks. These attacks can compromise the security of the network and its users, leading to data breaches and other security incidents. With 5G, a cybercriminal could potentially access a large number of compromised devices (such as smartphones or smart home devices) to quickly spread malware or ransomware over a network, eventually allowing the attacker to infect a large number of devices in a short period of time. potentially causing widespread disruption and damage.

DDoS Attacks: 5G technology has the potential to significantly increase the speed and capacity of wireless networks. This increased speed and capacity could make it easier for attackers to launch large-scale DDoS attacks. For example, with 5G, an attacker could potentially use a large number of connected devices (such as smartphones or smart home devices) to generate massive amounts of traffic and overwhelm a website or online service. This could make it difficult for the target website or service to function properly and potentially lead to major disruptions. Attackers could potentially use advanced techniques to bypass security measures and launch attacks that are more difficult to detect and defend against.

Man-in-the-middle attacks: With 5G, an attacker could use new techniques to intercept and manipulate data transmitted over the network. This could allow the attacker to read, modify, or even impersonate any of the parties involved in the communication, potentially leading to sensitive information theft or systems and networks being compromised. In addition, the increased speed and capacity of 5G networks could also make it easier for attackers to launch more sophisticated MitM attacks.

Q. How do you see the cybersecurity landscape in the country?
Cybercrime incidents are increasing overall and the rollout of 5G in India will increase cases considering that the architecture of 5G in India is relatively new and will open doors for cyberattacks. As we invent, cybercriminals are also inventing new ways to access our data and the arrival of 5G is a golden opportunity for them as 5G will connect everything – people, machines and devices.

Currently, India has 658 million internet users and 600 million smartphone users and this number is expected to grow exponentially in the coming years, making mobile security a necessity for everyone. Mobile security apps have a variety of features that protect your phone data, including confidential information and other data stored on it. One of the main benefits of installing a mobile protection app is real-time protection and digital security from mobile security risks.


Source link