How 5G Will Affect Cyber Security

Download MP3
The rollout of 5G will have a very serious impact on cyber security. In this episode, we'll explain exactly how 5G is different from 3G and 4G networks. We'll discuss why the risk of cyber attacks will increase and how you can prepare your devices for 5G. 5G is going to be a game changer in terms of how fast data can be transferred between devices and servers. But that increased speed comes at a cost: it makes us more vulnerable to cyber-attacks because cybercriminals can gain access to our systems through a variety of new entry points.

The rollout of 5G cellular data. It's going to have a very serious impact on cyber attacks and even cyber insurance. 5G is the next evolution. Of data. That's transmitted by cellular networks through your cell carrier AT&T T-Mobile Verizon. All the networks. Have different iterations and you've seen you know 3g 4g and 5G you might think well it's just one number more It's really not It's a completely different. Technology And what it's going to do is have very high bandwidth. And a much more robust…What's called latency meaning that…not only will the data be transmitted fast, but the delay between pinging the data and getting it back will be faster What this is going to do is allow 5G to be used for more types of connections, a lot of the things you have in your office or in your home or in your vehicle. Our computers that need to connect to the internet but also need to exchange. Data very quickly So you might use your wifi network Your wifi network has good latency. The cell network may not That's why sometimes when you watch videos or play games you have a little lag on your cell phone If it's four G, once you switch to 5G, that lag is going to disappear. There's going to be more coverage is going to be faster and what'll happen is men This is the key right here. Many of the devices you have currently. On your network at your home in your car are going to switch over from your wifi to 5G. Things like your routers things like your camera's things like your smart home devices things like even. music devices. What that's going to do is put additional layer of risk into your network. So right now if everything goes through your wifi, there's one wifi box. In your house or in your business, that can be protected because everything. That's coming from the outside goes through that wifi box So if you locked down that box you have good firewalls and you have good coverage Your risk profile will be lower. That's why we want to make sure that you get patches on all your wifi boxes routers that kind of thing. But once you go to 5G, All of those devices. That are in your premise. Are going to connect directly to 5G. So each one of them will technically be a vector point for danger. Each one of them it won't be going through your wifi anymore. They're all going to connect directly. So instead of having, you know like let's use it as an example. You know if you go to the airport you go to the security Everybody has to go through one security line Everybody gets checked by security. one place. That's your wifi box. Imagine if the airport just let anybody walk in off the street through any door through the fence through anywhere. That you have how are you going to verify ? All of those people. So…all of the devices on your premise are now going to need DB protected because they're all going to be hitting different wifi. I'm sorry different 5G towers…There'll be protocols for this There will be. Security for this but you want to make sure that you do it the best way to start is to get a census, a list of all the devices in your. network. The connect to the internet If even if right now they're connecting through your wifi or through another computer, you want to make sure you get a list of all those devices in your home and your business even in your car so that you know what's there That way you can make sure each one of them is protected because here's the thing. Even if you say well I don't care if somebody connects to my music system what are they going to do ? Turn up the volume. Well, They can certainly do malicious things to that device But once they're into your network, that device now probably connects to the rest of your network in it's a vector entry to where it's like a Trojan horse They can come in, they can capture that device and then use it to get into other devices. So make sure that prior to this 5G rollout, That you get a good list and you get good. best practice suggestions and advice from a qualified cyber insurance expert or even from your insurance broker to make sure that you know what is covered for losses and how to protect that. So the 5G rollout doesn't put you at more risk.

How 5G Will Affect Cyber Security
Broadcast by