Just A Normal Day At The Office For Huawei

Chinese telecom champion Huawei is a leader in next-generation 5G mobile communications networks and this comes at the price of suffering a million cyber-attacks every day, focused on stealing ing aspects of their 5G technology.  

Huawei has secured itself from a-lot of cyber-attacks, but still gets a-lot of cyber-attacks into its older IT systems and computers and these have been frequently hacked and the attackers have not currently been identified. 

By the end of 2018, Huawei had sold 200 million smartphones and had global revenues of $105.1 billion for 2018, with a net profit of $8.7 billion. Huawei said in a September statement that the US administration of President Donald Trump has launched cyber-attacks to “infiltrate Huawei’s Intranet and internal information systems.” These cyber-attacks have often used phishing, malware and virus by email. 

John Suffolk, global cyber security and privacy officer at Huawei who for 7 years used to work for   the UK Government, where he was the Britain’s CIO and CISO, leading the delivery of the Government’s strategy for the transformation of public services enabled by technology is quoted as sayig “We stand naked every year before the UK government security people who snigger at what we are doing, and make recommendations in a report......They said this time we needed to improve the software engineering in some of our old products, and put our design thinking into our new ones. And we are spending $2bn on that, and presenting or high level plan to the government in June.”

Huawei operates globally in about 170 nations and regions where it has commercial contracts related to 5G technology.  
5G technology will enable transmission of large amounts of data at extremely high speeds, allowing telecommunication devices to connect to almost all products and services, including those related to military affairs, through the wireless network.

The United States has been pushing its allies, such as Japan, to exclude Huawei from government contracts and it has said that its products may be assisting spying and espionage by the Chinese government. However, no evidence has been found to prove that the Chinese government has stolen confidential information by using products of Huawei, which was founded in 1987 by Ren Zhengfei, a former engineer in the Chinese military.

Speaking to Japan Times John Suffolk said, “If ever he was asked by the Chinese government to do something that he thought was inappropriate, like handing over data or building backdoors, he would blankly refuse to do that....If he was pressurised to do that, he would close the company down,”  

The widespread belief that Chinese firms are using spying methods are unlikely to fade anytime soon, given that the government and enterprises have close links in China, a country that is effectively ruled by the Communist Party alone, foreign affairs experts say.

Japan Times:              Forbes:           APNews:

You Might Also Read:

Huawei Will Sell Its 5G Know-How:

 

 

 

 

« Cybersecurity And The EU's Regime For 5G Networks
Reduce Business Disruption - Make Cyber Security A Priority »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.