Just A Normal Day At The Office For Huawei

Chinese telecom champion Huawei is a leader in next-generation 5G mobile communications networks and this comes at the price of suffering a million cyber-attacks every day, focused on stealing ing aspects of their 5G technology.  

Huawei has secured itself from a-lot of cyber-attacks, but still gets a-lot of cyber-attacks into its older IT systems and computers and these have been frequently hacked and the attackers have not currently been identified. 

By the end of 2018, Huawei had sold 200 million smartphones and had global revenues of $105.1 billion for 2018, with a net profit of $8.7 billion. Huawei said in a September statement that the US administration of President Donald Trump has launched cyber-attacks to “infiltrate Huawei’s Intranet and internal information systems.” These cyber-attacks have often used phishing, malware and virus by email. 

John Suffolk, global cyber security and privacy officer at Huawei who for 7 years used to work for   the UK Government, where he was the Britain’s CIO and CISO, leading the delivery of the Government’s strategy for the transformation of public services enabled by technology is quoted as sayig “We stand naked every year before the UK government security people who snigger at what we are doing, and make recommendations in a report......They said this time we needed to improve the software engineering in some of our old products, and put our design thinking into our new ones. And we are spending $2bn on that, and presenting or high level plan to the government in June.”

Huawei operates globally in about 170 nations and regions where it has commercial contracts related to 5G technology.  
5G technology will enable transmission of large amounts of data at extremely high speeds, allowing telecommunication devices to connect to almost all products and services, including those related to military affairs, through the wireless network.

The United States has been pushing its allies, such as Japan, to exclude Huawei from government contracts and it has said that its products may be assisting spying and espionage by the Chinese government. However, no evidence has been found to prove that the Chinese government has stolen confidential information by using products of Huawei, which was founded in 1987 by Ren Zhengfei, a former engineer in the Chinese military.

Speaking to Japan Times John Suffolk said, “If ever he was asked by the Chinese government to do something that he thought was inappropriate, like handing over data or building backdoors, he would blankly refuse to do that....If he was pressurised to do that, he would close the company down,”  

The widespread belief that Chinese firms are using spying methods are unlikely to fade anytime soon, given that the government and enterprises have close links in China, a country that is effectively ruled by the Communist Party alone, foreign affairs experts say.

Japan Times:              Forbes:           APNews:

You Might Also Read:

Huawei Will Sell Its 5G Know-How:

 

 

 

 

« Cybersecurity And The EU's Regime For 5G Networks
Reduce Business Disruption - Make Cyber Security A Priority »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

IQ Solutions

IQ Solutions

IQ Solutions is a Digital Integrator and an ICT Services Provider, focusing on innovative Cyber Secured ICT managed solutions tailored to the needs of the Maritime Industry.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.