5G is the fifth generation of cellular data technology. It lives alongside 4G and related technologies, such as LTE. The first 5G cellular network was constructed in 2018, while 5G devices became public in 2019 and 2020. These networks are predicted to have more than 1.7 billion subscribers worldwide by 2025, according to the GSM Association. 5G includes faster speeds, lower latency, and greater capacity than previous networks. The maximum data transfer rate of 5G is 20 Gbps (2.5 gigabytes per second). That is 20x faster than LTE-Advanced, which has a peak download speed of 1,000 Mbps. 5G latency (connection speed) is estimated to be 10-20 milliseconds, compared to 4G’s average latency of 40 ms. The maximum traffic capacity of 5G is roughly 100x greater than a typical 4G network.
Put simply, the 5G network is significantly faster and more powerful than its predecessors. The network is anticipated to increase bandwidth, being used as general internet service providers for laptops and desktop computers, competing with existing ISPs (cable internet), and also will make possible new applications in the internet of things (IoT) and machine-to-machine areas. 4G cellphones are not able to use the new networks, which require 5G enabled wireless devices.
Are there any shortcomings to 5G? Well yes, there are.
Faster Speeds but Proximity Issues Abound
5G uses Millimeter wavelength signals to communicate to your devices. These do not travel as far as older 4G networks making rural and suburban 5G networks difficult to build as more towers need to be erected to maintain connectivity. Additionally, 5G communications are more prone to physical obstructions such as buildings and even trees. So, while the data downloads and upload speeds are much faster, this is only true if you’re in proximity to a 5G tower.
What does this mean for an SMB?
- Keep Devices Up To Date
- Always patch your devices within a month of release.
- Turn Off Networking Protocols by Default
- Turn off your AWDL (AirDrop) when you aren’t using it. You should also turn off other networking protocols such as Bluetooth when not using them.
- If You’re a Programmer – Be Strict With Data
- It’s never a bad idea to do extra error and bug checking.
- Don’t Assume Apple Devices and Software are free from Bugs
- Oftentimes users are under the false pretense that Apple products are super secure, virus-free, and are never exploited. This is just not true. No code ever written was free from exploits or bugs. Read CyberHoot’s ‘Malware in Macs‘ article to learn more about Mac’s vulnerabilities.
- Adopt Two-Factor Authentication
- Adopt a Password Manager
- Use personally and professionally to improve password hygiene.
- Regularly Backup Data With The 3-2-1 Backup Method
- For backing up all your critical and sensitive data.
- Train Employees
- How to spot and avoid phishing attacks – the primary way cyberattacks occur.
- Test Employees
- On their training to validate they can spot and delete threats rather than click and succumb to an attack.