For some time now, in the face of an increase in telework employees.
Remote working today has become a requirement that the global health situation has imposed on many companies. According to the French Ministry of Labour, the remote collaboration of nearly 12.4 million students and 2.2 million employees can be counted as using them in recent times. This phenomenon is an exceptional increase in internet consumption worldwide. Such a situation puts a strain on telecom networks. Suppliers in charge of maintaining this whole system face a plural responsibility like never before. Ensure the quality of bandwidth that is increasingly consumed, while ensuring a minimum of security for users, as cyber criminals will seek to take advantage of it.
This article will also interest you: 5G security vulnerabilities
On the other hand, this raises the problem of vulnerability of networks. Philippe Alcoy of Netscout said: "The vulnerability of telecom networks is nothing new and certainly not born of recent changes in user practices. However, based on the experience of the 8.4 million denial-of-service (DDoS) attacks on the networks identified in 2019, it is likely that cybercriminals will not remain passive in the face of the doors of Ali Baba's 'camverne' that have opened up in front of them. ». In other words, vulnerabilities are present.
And so on hackers are not going to deprive themselves of taking advantage of it. So we wonder how to not suffer too much. According to the expert, it is necessary to anticipate. The majority of known attacks on Telecom's networks are fixed on particular determinant. "Now is the time for anticipation and risk management. In addition, there was a 64% increase in the frequency of DDoS attacks on mobile networks between the second half of 2018 and the same period in 2019, mainly due to online and mobile gaming respectively, via the use of smartphones as a wireless access point and 4G or LTE connectivity.
Compared to the containment period, these scenarios are probably still relevant in many households, and add to the current network complexity. ». Explains the expert. Therefore, being informed of the situation and the evolution of it is a necessity for suppliers and IT teams to propose operating schemes that could facilitate the construction of a security architecture. In this context, they will be able to protect the data of the different users of their systems. For example, by identifying unusual behaviors on cloud servers, they will be able to stop any form of malicious activity attempts. "First of all, they need an overview of the data packets that pass through the network. This allows them to perform key flow management functions, such as throughput conversion, data aggregation or load balancing, acting as a traffic agent and eliminating the burden of security systems. At the same time, they provide uninterrupted monitoring in the event of a power outage or tool failure, allowing traffic to be rebalanced quickly. philippe Alcoy advises. Advice in this context, that there is collaboration between mobile operators and IT teams, because the dependence at this level is very real.
Especially at a time when being connected to networks virtually at any time has become a requirement. "In other words, IT teams, themselves subject to remote work, need full visibility on the data to be protected and on the packet flows. He notes. In this way, IT teams can not only ensure continuity in their action, but they can also adapt their security system so that Telecom operators do not process traffic in a standard way to facilitate the identification of anomalies. And this would be a good thing insofar as we know that the networks used by users are generally dispersed and subject to certain constraints of local operators.
For Philippe Alcoy, the best way to ensure better security of users' data should be clearly combined with the monitoring tools of operators with the security tools of IT experts. "Indeed, security tools combined with those of network surveillance will allow companies to maintain the protection of their data managed remotely by their employees. ».
Now access an unlimited number of passwords: