Across the board, the sheer volume of cyberattacks and the number of affected organizations continue to rise. The impact of these attacks is also increasing, in terms of financial costs such as ransoms and fines, as well as lengthy business downtime and tarnished brand credibility.
While phishing and social engineering attacks are extremely common, network-based security breaches, including man-in-the-middle (MITM) attacks and Wi-Fi spoofing, are becoming particularly difficult to defend against. They simply require the attacker to be within range of the wireless network. What’s more, phishing and social engineering attacks can be used to deliver malware that exploits a vulnerability in a hotspot or Wi-Fi network.
We partnered with T-Mobile to conduct The Futurum Group’s Connected Laptop survey of 140 VP and C-Level respondents across a range of global industries and organization sizes. We defined a 5G-connected laptop as a device with a built-in cellular modem or wireless card that allows employees to connect to networks and other devices without using Wi-Fi, Ethernet, or a mobile hotspot. The survey focused on gaining a better understanding of how key decision makers view their cybersecurity threats. The respondents indicated that a critical mass of cyberattacks stems from usage of home or public Wi-Fi or hotspot networks. In fact, 39% of respondents confirmed that Wi-Fi attacks are their foremost security threat, outpacing phishing at 32%.
In our latest research brief, 5G Connected Devices: The Enduring Benefits of Advanced Security, done in partnership with T-Mobile for Business, we analyze the technological advancements and the changing dynamics of the modern workplace that significantly broaden the cyberattack surface. As a result, implementing comprehensive and proactive measures for cyber-resiliency becomes a top priority for businesses.
In the brief you’ll learn:
- The survey further confirmed that cybersecurity is a major concern for businesses as a significant portion of executives perceive remote workers as a greater security risk.
- In our 5G Connected Laptop Survey, only 9% of respondents indicated no concern that their organization will suffer a cyberattack, with the remaining 91% selecting levels of concern encompassing “somewhat concerned”, “very concerned” and “extremely concerned.”
- lackluster on-device security capabilities can result in a single-device compromise as well as multiple device lockouts through lateral spread across a network.
- 5G-connected devices are vital to defending against the plethora of security threats associated with Wi-Fi and hotspot network usage.
- The integral role that Intel’s 13th Gen Intel core mobile processors and vPro platform plays in assuring 5G connected laptop security and an advantageous user experience.
The T-Mobile and Intel alliance ensures the built-in firmware protection that is vital to countering the multitude of vulnerabilities that malicious actors seek to exploit. The Intel vPro platform’s support of Intel Hardware Shield provides the suite of security technologies key to safeguarding the entire compute stack.
The Futurum Group believes that T-Mobile’s nationwide 5G SA network, which remains the only nationwide 5G SA network in the US, uniquely provides the anti-tracking and spoofing features that prevent manipulation of individual device connections, further reinforced by a robust security portfolio that encompasses countless solutions, industries, and use cases. Through T-Mobile’s 5G network security profile, businesses can have the peace of mind that comes with integrity protection, automatic authentication of their mobile devices, and increased identity protection. If you are interested in learning more, download your copy of 5G Connected Devices: The Enduring Benefits of Advanced Security, today.
In partnership with:
Download Now
Author Information
Ron is an experienced, customer-focused research expert and analyst, with over 20 years of experience in the digital and IT transformation markets, working with businesses to drive consistent revenue and sales growth.
He is a recognized authority at tracking the evolution of and identifying the key disruptive trends within the service enablement ecosystem, including a wide range of topics across software and services, infrastructure, 5G communications, Internet of Things (IoT), Artificial Intelligence (AI), analytics, security, cloud computing, revenue management, and regulatory issues.
Prior to his work with The Futurum Group, Ron worked with GlobalData Technology creating syndicated and custom research across a wide variety of technical fields. His work with Current Analysis focused on the broadband and service provider infrastructure markets.
Ron holds a Master of Arts in Public Policy from University of Nevada — Las Vegas and a Bachelor of Arts in political science/government from William and Mary.
With a focus on data security, protection, and management, Krista has a particular focus on how these strategies play out in multi-cloud environments. She brings approximately 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.
Prior to joining The Futurum Group, Krista led the data protection practice for Evaluator Group and the data center practice of analyst firm Technology Business Research. She also created articles, product analyses, and blogs on all things storage and data protection and management for analyst firm Storage Switzerland and led market intelligence initiatives for media company TechTarget.