4G: Everything you need to know

With 4G being rapidly rolled out across the UK, we take a look at the potential benefits and problems that come with it

Are there any downsides to 4G?

While other networks are admittedly catching up quickly, there's still a clear leader in the 4G game EE. With a 10-month lead on the technology, the company has been able to build up its offering to include a range of advantages not even on the others' radar, but it also means that connectivity is still limited. Devices ready for 4G aren't much use if your area does not yet have coverage.

There's also a big issue with security, which is reportedly the main concern amongst consumers still considering whether or not to switch. In February 2014, the MailOnline reported from the Mobile World Congress event in Barcelona that, while the majority of phones at the event were being sold with 4G in mind, the improved data speeds come at the price of greater vulnerability.

Leonid Burakovsky, senior director of strategic solutions at F5, says: "What the industry has done with 4G/LTE is taken a self-contained telephone network, secured primarily by virtue of being separate from the internet, and then bolted-on internet capabilities which were never designed to prevent eavesdropping."

The less secure protocol used for 4G means that all manner of sensitive information is essentially left more vulnerable, from passwords to bank details, and this poses a huge problem for businesses interested in utilising the technology.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"The main security problem with 4G networks is that user information can become easily available to hackers via, for instance, man-in-the-middle' attacks, and hackers can compromise new services like mobile health or mobile commerce," Burakovsky continues.

With the technology still relatively young, especially in the UK, networks are under pressure to reassure consumers of 4Gs' safety, especially in a business environment in which the sharing of potentially sensitive information is a part of day-to-day life.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/security/cyber-security/354468/if-not-passwords-then-what
cyber security

If not passwords then what?

8 Jan 2020
Visit/policy-legislation/31772/gdpr-and-brexit-how-will-one-affect-the-other
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020