Just A Normal Day At The Office For Huawei

Chinese telecom champion Huawei is a leader in next-generation 5G mobile communications networks and this comes at the price of suffering a million cyber-attacks every day, focused on stealing ing aspects of their 5G technology.  

Huawei has secured itself from a-lot of cyber-attacks, but still gets a-lot of cyber-attacks into its older IT systems and computers and these have been frequently hacked and the attackers have not currently been identified. 

By the end of 2018, Huawei had sold 200 million smartphones and had global revenues of $105.1 billion for 2018, with a net profit of $8.7 billion. Huawei said in a September statement that the US administration of President Donald Trump has launched cyber-attacks to “infiltrate Huawei’s Intranet and internal information systems.” These cyber-attacks have often used phishing, malware and virus by email. 

John Suffolk, global cyber security and privacy officer at Huawei who for 7 years used to work for   the UK Government, where he was the Britain’s CIO and CISO, leading the delivery of the Government’s strategy for the transformation of public services enabled by technology is quoted as sayig “We stand naked every year before the UK government security people who snigger at what we are doing, and make recommendations in a report......They said this time we needed to improve the software engineering in some of our old products, and put our design thinking into our new ones. And we are spending $2bn on that, and presenting or high level plan to the government in June.”

Huawei operates globally in about 170 nations and regions where it has commercial contracts related to 5G technology.  
5G technology will enable transmission of large amounts of data at extremely high speeds, allowing telecommunication devices to connect to almost all products and services, including those related to military affairs, through the wireless network.

The United States has been pushing its allies, such as Japan, to exclude Huawei from government contracts and it has said that its products may be assisting spying and espionage by the Chinese government. However, no evidence has been found to prove that the Chinese government has stolen confidential information by using products of Huawei, which was founded in 1987 by Ren Zhengfei, a former engineer in the Chinese military.

Speaking to Japan Times John Suffolk said, “If ever he was asked by the Chinese government to do something that he thought was inappropriate, like handing over data or building backdoors, he would blankly refuse to do that....If he was pressurised to do that, he would close the company down,”  

The widespread belief that Chinese firms are using spying methods are unlikely to fade anytime soon, given that the government and enterprises have close links in China, a country that is effectively ruled by the Communist Party alone, foreign affairs experts say.

Japan Times:              Forbes:           APNews:

You Might Also Read:

Huawei Will Sell Its 5G Know-How:

 

 

 

 

« Cybersecurity And The EU's Regime For 5G Networks
Reduce Business Disruption - Make Cyber Security A Priority »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Certes Networks

Certes Networks

Certes Networks offers an encryption management solution that can be seamlessly integrated and is interoperable with any network.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.