sb-nz logo
Story image

5G could lead to shadow IoT if security is ignored

24 Jul 2018

While 5G promises to shake up the world of mobile apps, communications, and IoT, 5G’s potential for scalability may end up taking a darker turn.

Experts from ForeScout say that businesses may end up using 5G-deployed applications without getting IT teams involved, which may lead to shadow IoT that could create even more problems.

Those problems include security and performance challenges for businesses, particularly as industry standards governing IoT security today are basic.

 “The advent of the cloud a decade ago made it possible for employees to implement cloud-based solutions with nothing more than a credit card and an internet connection. This led to the rise of unapproved, unsecured applications being used in enterprises, which is what became known as shadow IT,” comments ForeScout director for Asia Pacific and Japan, Steve Hunter.

“Just like cloud, 5G will make it easy for businesses to deploy applications more quickly without the perceived friction that the internal IT organisation can introduce.” 

He believes that for enterprise IoT, 5G will help to examine use cases that are deployed today on 4G or 3G networks. But like all applications, they become extensions of the enterprise network and they need to be secured.

ForeScout says it’s essential to prioritise security tools that offer visibility, particularly as organisations prepare for the ‘onslaught’ of IoT applications when 5G becomes widely available.

“The only way to secure the network is to know exactly what’s connected and how it’s being used,” says Hunter.

“When business units can do this without IT assistance, gaining full visibility becomes complex. We’ve seen this story before with both the BYOD challenge post-iPhone and then the rapid adoption of the cloud. The upcoming rollout of 5G will motivate organisations to explore of the business value of IoT, so it’s essential to shine a light into every dark corner of the network now to prevent visibility gaps in the future.” 

Although the 5G standard isn’t expected to be solidified until 2020, service providers are currently testing pre-standard 5G networks.

ForeScout says many use cases will operate effectively on existing networks, so some businesses are exploring IoT deployments today. Taking a proactive position on IoT deployments can help IT reduce the instances of shadow IoT by avoiding the perception of IT-introduced friction.  “It’s important to learn the lessons from IT history. The technology and security functions had to integrate cloud into corporate IT to rein in shadow IT. Similarly, IT should gain control of today’s shadow IoT and by doing so make ready for the future of IoT that’s coming with 5G,” Hunter concludes.

Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Download image
Network functions virtualisation: What is is, how to use it, and why it matters
Network functions virtualisation (NFV) is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More