Just A Normal Day At The Office For Huawei

Chinese telecom champion Huawei is a leader in next-generation 5G mobile communications networks and this comes at the price of suffering a million cyber-attacks every day, focused on stealing ing aspects of their 5G technology.  

Huawei has secured itself from a-lot of cyber-attacks, but still gets a-lot of cyber-attacks into its older IT systems and computers and these have been frequently hacked and the attackers have not currently been identified. 

By the end of 2018, Huawei had sold 200 million smartphones and had global revenues of $105.1 billion for 2018, with a net profit of $8.7 billion. Huawei said in a September statement that the US administration of President Donald Trump has launched cyber-attacks to “infiltrate Huawei’s Intranet and internal information systems.” These cyber-attacks have often used phishing, malware and virus by email. 

John Suffolk, global cyber security and privacy officer at Huawei who for 7 years used to work for   the UK Government, where he was the Britain’s CIO and CISO, leading the delivery of the Government’s strategy for the transformation of public services enabled by technology is quoted as sayig “We stand naked every year before the UK government security people who snigger at what we are doing, and make recommendations in a report......They said this time we needed to improve the software engineering in some of our old products, and put our design thinking into our new ones. And we are spending $2bn on that, and presenting or high level plan to the government in June.”

Huawei operates globally in about 170 nations and regions where it has commercial contracts related to 5G technology.  
5G technology will enable transmission of large amounts of data at extremely high speeds, allowing telecommunication devices to connect to almost all products and services, including those related to military affairs, through the wireless network.

The United States has been pushing its allies, such as Japan, to exclude Huawei from government contracts and it has said that its products may be assisting spying and espionage by the Chinese government. However, no evidence has been found to prove that the Chinese government has stolen confidential information by using products of Huawei, which was founded in 1987 by Ren Zhengfei, a former engineer in the Chinese military.

Speaking to Japan Times John Suffolk said, “If ever he was asked by the Chinese government to do something that he thought was inappropriate, like handing over data or building backdoors, he would blankly refuse to do that....If he was pressurised to do that, he would close the company down,”  

The widespread belief that Chinese firms are using spying methods are unlikely to fade anytime soon, given that the government and enterprises have close links in China, a country that is effectively ruled by the Communist Party alone, foreign affairs experts say.

Japan Times:              Forbes:           APNews:

You Might Also Read:

Huawei Will Sell Its 5G Know-How:

 

 

 

 

« Cybersecurity And The EU's Regime For 5G Networks
Reduce Business Disruption - Make Cyber Security A Priority »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Bastion Security Group

Bastion Security Group

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini.