For anyone who is a keen follower of technology, it is highly likely that they have been a part of conversations around the 'Race to 5G' and the impact it can have on economies and societies. While 5G networks are already effectively fueling innovation and increasing performance across several industries, this innovation also brings with it an increased risk towards data privacy and protection.
Cellular companies began deploying the fifth-generation technology standard for broadband cellular networks worldwide in 2019 and are the planned successor to the 4G networks that provide connectivity to most current cellphones. 5G networks are predicted to have more than 1.7 billion subscribers worldwide by 2025, according to the GSM Association and are expected to support up to a million devices per square kilometre.
The road to 5G began back in 2015 and today, it is the fastest-growing mobile technology with commercial operations live in 24 markets. By offering greater speed in transmissions, lower latency, better control over remotely connected applications, and real-time ability to sense and respond, 5G enables instant connectivity to billions of devices.
Because of its ability to create a hyper-connected environment where not all networks and devices are built with equal security measures or regulations, the chances of online fraud, data breach, identity theft, and ransomware attacks are higher. As we inch closer towards more rollouts that are commercial across industries, it is important to consider a privacy-by-design approach and develop a proposal that will safeguard data and ensure privacy.
In a 5G-powered world, the network infrastructure moves away from a central, hardware-based network to a decentralised, virtual, and software-defined network (SDN). Networks prior to 5G operated with physical plug points where security checks were done; however, in a software-defined network, virtualised network functions (VNF) take place at the virtual network edge, thus eliminating points of inspection and control.
With no physical boundaries and a 5G network using cloud-based data storage, there is a high probability that operators will find it difficult to control user data stored in cloud environments. Usually, countries often operate at different levels of privacy measures and enforcement, and hence data protection remains highly challenged when the data is stored in the cloud outside of the home country.
While business is gearing up to unlock the opportunities 5G presents, it is important to consider a privacy-by-design approach and develop a proposal that will protect organisations against attacks. As 5G is breaking the boundaries of what is possible with mobile network technology, new regulations and guidelines defining how 5G networks operate need to be enacted, primarily because the usage will impact more enterprises and individuals.
5G manufacturers and solution providers should be designing insecurity into their networks, and enterprises should be held responsible for the privacy of data created and stored on the network. There is also a need for enhanced identity access management and data protection, in addition to the physical security of on-location customer equipment.
Lastly, businesses need to educate employees on their shared responsibility of protecting company assets on a 5G network. With the hybrid work culture making significant progress, regular training should be provided to key stakeholders to foster a culture wherein each individual is aware and has the ability to control the transfer of data.
For a network superior to 5G, businesses need to be prepared with solutions based on high cybersecurity standards and privacy best practices to truly unleash the potential it offers.
If you have any feedback on this article or would like to reach out to our team to know more, please email us at
communications@vfsglobal.com