{"id":5692,"date":"2019-11-26T17:05:32","date_gmt":"2019-11-26T17:05:32","guid":{"rendered":"https:\/\/www.register365.com\/blog\/?p=5692"},"modified":"2019-11-26T17:06:17","modified_gmt":"2019-11-26T17:06:17","slug":"does-5g-pose-a-risk-to-online-security","status":"publish","type":"post","link":"https:\/\/www.register365.com\/blog\/does-5g-pose-a-risk-to-online-security\/","title":{"rendered":"Does 5G pose a risk to online security?"},"content":{"rendered":"\n<p>The fifth generation (5G) mobile network offers many advantages in \nterms of speed. It allows faster, smoother downloads of video and other \ncontent. <\/p>\n\n\n\n<p>5G has the potential to change the way we use mobile data in both our\n business and personal lives so what implications does it have for \nonline security? <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Device connections <\/h2>\n\n\n\n<p>The risk from 5G use is unlikely to come from the technology itself. \n5G uses encryption and improved verification methods so it is \nsignificantly better than the earlier 3G and 4G standards. However, this\n does not mean it is protected from all threats. <br><br>In practice, \nthe biggest issue is likely to come from the Internet of Things (IoT). \n5G makes new data connections possible so there will be new ways to \nexploit devices. A whole range of  IoT devices including security \ncameras, smart speakers, fridges, baby monitors, medical devices and \nlots more are now connected to the internet and this presents online \nsecurity risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Internet of Things (IoT) <\/h2>\n\n\n\n<p>There will be as many as 25 billion IoT devices by 2021. These are \nlikely to attract hackers according to Gartner research. The problem is,\n low-cost IoT devices don\u2019t have the processing power to support the \nsophisticated security that computers and smartphones enjoy.<\/p>\n\n\n\n<p>Using 5G speed, hackers can rapidly scan devices for vulnerabilities  like default passwords. Once a connected device is exploited, criminals can extract and transfer data quickly, before the attack is even discovered. <\/p>\n\n\n\n<p>Direct connections to mobile internet makes cyber attacks easier as \nthere\u2019s no added security of domestic routers and firewalls. It can also\n be an issue for businesses if employees use 5G instead of the secure \nnetwork to access corporate data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New attacks on online security<\/h2>\n\n\n\n<p>While most 5G attacks are likely to have evolved from existing  threats, it opens up some new avenues too. New technology incorporating  artificial intelligence and so-called \u2018deep fakes\u2019 could lead to the  creation of robot calls that imitate trusted friends or businesses.<br><br>As  5G becomes a key part of many countries\u2019 communication infrastructure,  it will likely become a tempting target for nation-state attackers too.  These attacks will seek to disrupt communications and other activity.<br><br>As with any technology, basic errors such as misconfiguration can leave  online security vulnerable.  In an effort to prevent problems,  communications providers and governments are scrambling to introduce  security standards for 5G. It\u2019s important the risks are understood and  corrected before they become a major threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The fifth generation (5G) mobile network offers many advantages in terms of speed. It allows faster, smoother downloads of video and other content. 5G has the potential to change the&#8230; <a class=\"more-link\" href=\"https:\/\/www.register365.com\/blog\/does-5g-pose-a-risk-to-online-security\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":22,"featured_media":5181,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-5692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Does 5G pose a risk to online security?<\/title>\n<meta name=\"description\" content=\"Direct connections to mobile internet makes cyber attacks easier as there\u2019s no additional online security e.g. domestic routers and firewalls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does 5G pose a risk to online security?\" \/>\n<meta property=\"og:description\" content=\"Direct connections to mobile internet makes cyber attacks easier as there\u2019s no additional online security e.g. domestic routers and firewalls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Register365 Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/register365\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-26T17:05:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-26T17:06:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/\",\"url\":\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/\",\"name\":\"Does 5G pose a risk to online security?\",\"isPartOf\":{\"@id\":\"https:\/\/www.register365.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"datePublished\":\"2019-11-26T17:05:32+00:00\",\"dateModified\":\"2019-11-26T17:06:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748\"},\"description\":\"Direct connections to mobile internet makes cyber attacks easier as there\u2019s no additional online security e.g. domestic routers and firewalls.\",\"breadcrumb\":{\"@id\":\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#primaryimage\",\"url\":\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"contentUrl\":\"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"width\":945,\"height\":425,\"caption\":\"secure website\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Register365\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.register365.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.register365.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Does 5G pose a risk to online security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.register365.com\/blog\/#website\",\"url\":\"https:\/\/www.register365.com\/blog\/\",\"name\":\"Register365 Blog\",\"description\":\"Welcome to the Register365 blog! Keep up to date with our latest news and product updates, find out more about our Free Online Business Training, and share your comments with us!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.register365.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748\",\"name\":\"Nathan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.register365.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g\",\"caption\":\"Nathan\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time you'll find him on a train travelling through some beautiful countryside, or curled up on a sofa with his head in a book.\",\"url\":\"https:\/\/www.register365.com\/blog\/author\/nathan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Does 5G pose a risk to online security?","description":"Direct connections to mobile internet makes cyber attacks easier as there\u2019s no additional online security e.g. domestic routers and firewalls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/","og_locale":"en_GB","og_type":"article","og_title":"Does 5G pose a risk to online security?","og_description":"Direct connections to mobile internet makes cyber attacks easier as there\u2019s no additional online security e.g. domestic routers and firewalls.","og_url":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/","og_site_name":"Register365 Blog","article_publisher":"https:\/\/www.facebook.com\/register365","article_published_time":"2019-11-26T17:05:32+00:00","article_modified_time":"2019-11-26T17:06:17+00:00","og_image":[{"width":945,"height":425,"url":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","type":"image\/png"}],"author":"Nathan","twitter_misc":{"Written by":"Nathan","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/","url":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/","name":"Does 5G pose a risk to online security?","isPartOf":{"@id":"https:\/\/www.register365.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#primaryimage"},"image":{"@id":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","datePublished":"2019-11-26T17:05:32+00:00","dateModified":"2019-11-26T17:06:17+00:00","author":{"@id":"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748"},"description":"Direct connections to mobile internet makes cyber attacks easier as there\u2019s no additional online security e.g. domestic routers and firewalls.","breadcrumb":{"@id":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#primaryimage","url":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","contentUrl":"https:\/\/www.register365.com\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","width":945,"height":425,"caption":"secure website"},{"@type":"BreadcrumbList","@id":"https:\/\/register365.com\/blog\/2019\/11\/does-5g-pose-a-risk-to-online-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Register365","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.register365.com\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.register365.com\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"Does 5G pose a risk to online security?"}]},{"@type":"WebSite","@id":"https:\/\/www.register365.com\/blog\/#website","url":"https:\/\/www.register365.com\/blog\/","name":"Register365 Blog","description":"Welcome to the Register365 blog! Keep up to date with our latest news and product updates, find out more about our Free Online Business Training, and share your comments with us!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.register365.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.register365.com\/blog\/#\/schema\/person\/b8684be81b9b651f59d97f7bac864748","name":"Nathan","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.register365.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=identicon&r=g","caption":"Nathan"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time you'll find him on a train travelling through some beautiful countryside, or curled up on a sofa with his head in a book.","url":"https:\/\/www.register365.com\/blog\/author\/nathan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts\/5692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/comments?post=5692"}],"version-history":[{"count":2,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts\/5692\/revisions"}],"predecessor-version":[{"id":5694,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/posts\/5692\/revisions\/5694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/media\/5181"}],"wp:attachment":[{"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/media?parent=5692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/categories?post=5692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.register365.com\/blog\/wp-json\/wp\/v2\/tags?post=5692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}