The telecommunications industry is facing a critical moment, as we all understand the devastating vulnerabilities that span providers and regions worldwide. Bad actors are exploiting outdated network equipment, unpatched systems, and insecure protocols, highlighting the urgent need for stronger, more resilient infrastructure. These challenges expose an uncomfortable truth: the security of our networks is only as strong as their weakest components.
Modernizing telecommunications infrastructure to address security risks
While we’ve spent the past decade racing toward 5G deployment, network virtualization, and ambitious promises of 6G innovation, elements of global infrastructure have been left running on borrowed time and outdated security. Legacy appliances sit in data centers worldwide; their firmware unchanged for years and their administrative interfaces accessible via protocols designed before cybersecurity was a serious consideration.
As the industry gathers in Barcelona at Mobile World Congress to discuss the future of mobile connectivity, we need to have a conversation about resilient infrastructure, not as a compliance checkbox or a future roadmap item, but as the foundation that every innovation in this industry depends on.
Resilient infrastructure means networks that can withstand, adapt to, and rapidly recover from current and future threats. It means ensuring every appliance is patched, every application is hardened, and every insecure protocol is retired. Because in an interconnected world, the strength of our network is determined not by our most advanced technology, but by our most vulnerable component.
Cisco’s commitment to secure infrastructure
Cisco has doubled down on our commitment to resilient infrastructure. To increase the security posture of Cisco devices, we are making changes to default settings, deprecating and removing insecure capabilities, and introducing new security features. These changes are designed to strengthen your network infrastructure and provide better visibility into threat actor activities.
To reduce your attack surface and protect sensitive data, insecure features and protocols will be systematically flagged and eventually sunset from Cisco products. Our phased removal strategy (warnings, restrictions, and removals) is planned to span three feature releases to minimize disruption.
While cybersecurity will always be a shared responsibility that includes users, administrators, vendors, and policymakers, I believe that what we are now doing at Cisco is game-changing. It shouldn’t just be easy to secure your networks; it should be ridiculously difficult to operate them insecurely.
Securing the future of mobile networks
As we advance toward a more secure and resilient future for global mobile networks in the AI-era, now is the time to strengthen your infrastructure and safeguard your organization against evolving threats.
Discover how Cisco’s solutions can empower your network with robust security and always-on performance.
Visit Cisco’s Networking page to learn more and take the next step in securing your connectivity.
