Intelligent CIO LATAM Issue 22 | Page 42


THE HIGH CONNECTIVITY OF 5G WILL REQUIRE COMPANIES TO ADOPT MORE COMPREHENSIVE AND INTELLIGENT SECURITY MEASURES WITH TECHNOLOGIES CAPABLE OF EXTENDING THE REACH OF PROTECTION POLICIES . or launching Distributed Denial of Service ( DDoS ) attacks , for example . It is worth noting that this increased connectivity , with more data and equipment , will likely also drive an era of edge computing – with processing , storage and operation of data done away from the central cores that have always guided infrastructures . And that will also mean attackers can have even more chances to intercept data .

There is nothing wrong with this path . It is an efficient solution . However , allowing these environments to run without supervision and protection could mean unleashing attacks or hijackings .
Other relevant aspects to evaluate are the advancement of the Metaverse and the Human-Digital economy , with the possibility of connecting virtual and real worlds ( including Virtual Reality glasses and smart
of the Internet of Things ( IoT ) will change – or expand – the nature of threats , requiring the construction of a new model of trust , whether for domestic or industrial use .
The high connectivity of 5G will require companies to adopt more comprehensive and intelligent security measures with technologies capable of extending the reach of protection policies .
It is important to create strategies that mitigate possible vulnerabilities , preferably proactively anticipating analyses beyond the network borders . If the perimeter to be protected is more diffuse , bracelets that monitor biological data , among others ). The sum usually bases on decomposed , virtualized and distributed network functions , with new components connected to people . But the result can also expose new points of cyberattack and lead to challenges in managing personal cybersecurity .
It is not about abandoning the opportunities that 5G will bring to our experience in this or another world . On the contrary , the thought should be to take advantage of this time while the world prepares for this new era to discuss and implement modern and betterprepared cybersecurity solutions to ensure that everything runs smoothly .
Cleber Ribas , CEO , Blockbit decentralized and complex , we should implement solutions that seek to expose these endpoints and users to as little risk as possible .
Many companies , for example , have infrastructures that no longer keep up with the reality of the current connection . They will undoubtedly have to change their current approaches to deal with emerging technologies related to the 5G Internet .
These measures must be in place to prevent cybercriminals from hijacking connected devices
As new resources and ideas emerge to take advantage of the benefits of 5G , it is essential that companies
42 INTELLIGENTCIO LATAM www . intelligentcio . com