For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start.
As manufacturing companies continue to adopt Industry 4.0, many environments could still be falling short on security with outdated systems, unpatched vulnerabilities, and unsecure files that leave them vulnerable to attacks.
More than 13,000 Internet Small Computer Systems Interface (iSCSI) clusters were found to be unsecured and accessible over the public internet due to their owners’ failing to password-protect them.
Personal health information of over 350,000 consumers were potentially compromised after nine employees of the Oregon Department of Human Services (DHS) fell victim to a phishing attack.
Parisian authorities recently arrested five men for hacking gas station pumps and stealing 120,000 liters of petrol and diesel. This was possible because the stations did not change the default PIN code of their gas pumps.
A business email compromise (BEC) scheme took more than $100 million from Facebook and Google. Legitimate-looking invoices, contracts and more fooled the two tech companies and they wired millions to the fraudsters over a period of years.