Risks Rise as Legacy Systems Incorporate New Technologies and Connected Devices

Date:

Title: Risks Increase as Legacy Systems Incorporate New Technologies and Connected Devices

The convergence of legacy systems with new technologies and the addition of connected devices presents a growing risk for companies across various industries. This integration brings about changes in processes, requiring IT and operational technology (OT) teams to adapt and create new security strategies. Consequently, these changes give rise to new challenges and vulnerabilities that need to be addressed effectively.

During a panel discussion at the recent RCR Wireless News’ Industrial 5G Forum, industry experts shared their insights on reducing operational complexity, integrating a diverse range of technologies, and ensuring the seamless integration of 5G with robust security systems.

Pamela Gupta, CEO of Trusted AI, highlighted one of the main challenges related to the convergence of IT and OT teams: the shift away from the traditional security model. Gupta emphasized that implementing 5G disrupts the traditional model of segregating environments through security technologies like firewalls. Unlike previous systems, 5G directs traffic to routers rather than a centralized security system, presenting new security challenges that must be addressed.

Neils Konig, the head of department production metrology at Fraunhofer IPT and coordinator of 5G Industry Campus Europe, emphasized the challenge of bringing together different cultures, vocabularies, and paradigms prevalent in the mobile communication industry and the production industry. While communication between different teams is possible, Konig emphasized that differences in ecosystems and security architectures create additional hurdles.

A survey conducted specifically on the cybersecurity implications of 5G in production reveals that the majority of companies recognize the potential benefits of 5G in their industry. However, 75% of these companies also acknowledge the need for special security measures to protect their 5G systems.

See also  Introducing Varilux XR Series™: Essilor® unveils revolutionary eye-responsive lens powered by AI, India

Vijayakumar Kempuraj, digital twin lead at Ford, draws attention to the risks associated with integrating legacy systems. These older OT systems may lack support for modern security measures, leaving them vulnerable to potential threats. Moreover, a lack of expertise in IT and security, as well as difficulties in bridging the gap between these two domains, contribute to the overall challenges faced by companies.

When considering the risks for manufacturers planning to adopt 5G, Konig cautions that different security levels exist between public and private networks. Private on-premise 5G networks offer the highest security level, while public networks maintain a lower security threshold. Nevertheless, public networks should not be dismissed as unsecured, as measures are in place to ensure their reliability.

In summary, the incorporation of new technologies and connected devices into legacy systems introduces complex challenges and security vulnerabilities for companies across various industries. Adjustments in security configurations, bridging gaps between IT and OT teams, addressing legacy systems’ limitations, and acquiring the necessary expertise are critical steps in safeguarding businesses against potential threats. Companies must also be aware of the distinct security levels between public and private 5G networks and implement appropriate measures accordingly.

As industries continue to navigate this evolving landscape, effective risk management and robust security measures will be crucial in safeguarding critical systems, protecting sensitive data, and ensuring uninterrupted operations.

Sources:
– RCR Wireless News: [insert link here]
– Fraunhofer IPT: [insert link here]

Frequently Asked Questions (FAQs) Related to the Above News

What risks do legacy systems face when incorporating new technologies and connected devices?

The convergence of legacy systems with new technologies and connected devices introduces new challenges and vulnerabilities. Legacy systems may lack support for modern security measures, making them vulnerable to potential threats.

How does the shift towards 5G impact traditional security models?

Implementing 5G disrupts the traditional model of segregating environments through security technologies. Instead of relying on a centralized security system, 5G directs traffic to routers, presenting new security challenges that need to be addressed.

What challenges arise from integrating different teams and ecosystems in the mobile communication and production industries?

Bringing together different cultures, vocabularies, and paradigms prevalent in the mobile communication industry and the production industry creates additional hurdles. Differences in ecosystems and security architectures may complicate communication and collaboration between teams.

Do companies recognize the need for special security measures to protect their 5G systems?

Yes, a survey conducted on the cybersecurity implications of 5G in production shows that 75% of companies recognize the need for special security measures to protect their 5G systems while acknowledging the potential benefits of 5G in their industry.

What risks are associated with integrating legacy systems?

Integrating legacy systems can present risks due to their potential lack of support for modern security measures. A lack of expertise in IT and security, as well as difficulties in bridging the gap between these domains, contribute to the overall challenges faced by companies.

What are the differences in security levels between public and private 5G networks?

Private on-premise 5G networks offer the highest security level, while public networks maintain a lower security threshold. However, public networks do have measures in place to ensure their reliability and should not be dismissed as unsecured.

What steps can companies take to safeguard against potential threats in this evolving landscape?

Companies should make adjustments in security configurations, bridge gaps between IT and OT teams, address the limitations of legacy systems, and acquire the necessary expertise. They should also be aware of the distinct security levels between public and private 5G networks and implement appropriate measures accordingly. Effective risk management and robust security measures are crucial in safeguarding critical systems, protecting sensitive data, and ensuring uninterrupted operations.

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Share post:

Subscribe

Popular

More like this
Related

Obama’s Techno-Optimism Shifts as Democrats Navigate Changing Tech Landscape

Explore the evolution of tech policy from Obama's optimism to Harris's vision at the Democratic National Convention. What's next for Democrats in tech?

Tech Evolution: From Obama’s Optimism to Harris’s Vision

Explore the evolution of tech policy from Obama's optimism to Harris's vision at the Democratic National Convention. What's next for Democrats in tech?

Tonix Pharmaceuticals TNXP Shares Fall 14.61% After Q2 Earnings Report

Tonix Pharmaceuticals TNXP shares decline 14.61% post-Q2 earnings report. Evaluate investment strategy based on company updates and market dynamics.

The Future of Good Jobs: Why College Degrees are Essential through 2031

Discover the future of good jobs through 2031 and why college degrees are essential. Learn more about job projections and AI's influence.