Just A Normal Day At The Office For Huawei

Chinese telecom champion Huawei is a leader in next-generation 5G mobile communications networks and this comes at the price of suffering a million cyber-attacks every day, focused on stealing ing aspects of their 5G technology.  

Huawei has secured itself from a-lot of cyber-attacks, but still gets a-lot of cyber-attacks into its older IT systems and computers and these have been frequently hacked and the attackers have not currently been identified. 

By the end of 2018, Huawei had sold 200 million smartphones and had global revenues of $105.1 billion for 2018, with a net profit of $8.7 billion. Huawei said in a September statement that the US administration of President Donald Trump has launched cyber-attacks to “infiltrate Huawei’s Intranet and internal information systems.” These cyber-attacks have often used phishing, malware and virus by email. 

John Suffolk, global cyber security and privacy officer at Huawei who for 7 years used to work for   the UK Government, where he was the Britain’s CIO and CISO, leading the delivery of the Government’s strategy for the transformation of public services enabled by technology is quoted as sayig “We stand naked every year before the UK government security people who snigger at what we are doing, and make recommendations in a report......They said this time we needed to improve the software engineering in some of our old products, and put our design thinking into our new ones. And we are spending $2bn on that, and presenting or high level plan to the government in June.”

Huawei operates globally in about 170 nations and regions where it has commercial contracts related to 5G technology.  
5G technology will enable transmission of large amounts of data at extremely high speeds, allowing telecommunication devices to connect to almost all products and services, including those related to military affairs, through the wireless network.

The United States has been pushing its allies, such as Japan, to exclude Huawei from government contracts and it has said that its products may be assisting spying and espionage by the Chinese government. However, no evidence has been found to prove that the Chinese government has stolen confidential information by using products of Huawei, which was founded in 1987 by Ren Zhengfei, a former engineer in the Chinese military.

Speaking to Japan Times John Suffolk said, “If ever he was asked by the Chinese government to do something that he thought was inappropriate, like handing over data or building backdoors, he would blankly refuse to do that....If he was pressurised to do that, he would close the company down,”  

The widespread belief that Chinese firms are using spying methods are unlikely to fade anytime soon, given that the government and enterprises have close links in China, a country that is effectively ruled by the Communist Party alone, foreign affairs experts say.

Japan Times:              Forbes:           APNews:

You Might Also Read:

Huawei Will Sell Its 5G Know-How:

 

 

 

 

« Cybersecurity And The EU's Regime For 5G Networks
Reduce Business Disruption - Make Cyber Security A Priority »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.