sb-eu logo
Story image

5G could lead to shadow IoT if security is ignored

24 Jul 2018

While 5G promises to shake up the world of mobile apps, communications, and IoT, 5G’s potential for scalability may end up taking a darker turn.

Experts from ForeScout say that businesses may end up using 5G-deployed applications without getting IT teams involved, which may lead to shadow IoT that could create even more problems.

Those problems include security and performance challenges for businesses, particularly as industry standards governing IoT security today are basic.

 “The advent of the cloud a decade ago made it possible for employees to implement cloud-based solutions with nothing more than a credit card and an internet connection. This led to the rise of unapproved, unsecured applications being used in enterprises, which is what became known as shadow IT,” comments ForeScout director for Asia Pacific and Japan, Steve Hunter.

“Just like cloud, 5G will make it easy for businesses to deploy applications more quickly without the perceived friction that the internal IT organisation can introduce.” 

He believes that for enterprise IoT, 5G will help to examine use cases that are deployed today on 4G or 3G networks. But like all applications, they become extensions of the enterprise network and they need to be secured.

ForeScout says it’s essential to prioritise security tools that offer visibility, particularly as organisations prepare for the ‘onslaught’ of IoT applications when 5G becomes widely available.

“The only way to secure the network is to know exactly what’s connected and how it’s being used,” says Hunter.

“When business units can do this without IT assistance, gaining full visibility becomes complex. We’ve seen this story before with both the BYOD challenge post-iPhone and then the rapid adoption of the cloud. The upcoming rollout of 5G will motivate organisations to explore of the business value of IoT, so it’s essential to shine a light into every dark corner of the network now to prevent visibility gaps in the future.” 

Although the 5G standard isn’t expected to be solidified until 2020, service providers are currently testing pre-standard 5G networks.

ForeScout says many use cases will operate effectively on existing networks, so some businesses are exploring IoT deployments today. Taking a proactive position on IoT deployments can help IT reduce the instances of shadow IoT by avoiding the perception of IT-introduced friction.  “It’s important to learn the lessons from IT history. The technology and security functions had to integrate cloud into corporate IT to rein in shadow IT. Similarly, IT should gain control of today’s shadow IoT and by doing so make ready for the future of IoT that’s coming with 5G,” Hunter concludes.

Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Gartner predicts 75% of CEOs to be liable for cyber-physical security incidents by 2024
The nature of CPSs means incidents can quickly lead to physical harm to people, destruction of property or environmental disasters – and Gartner’s new research indicates that these incidents will increase drastically in the next few years if the lack of spending on these assets continues.More
Story image
Global DDoS attacks: What they are, how they work, and how to defend against them
Do not pay the ransom, and do make sure you've got strong DDoS protection, security firms warn.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
Video: 10 Minute IT Jam – F-Secure talks APTs and the Lazarus Group
We spoke to F-Secure's director of detection and response, Matt Lawrence.More