BT Risks Fine As Huawei Removal Deadline Nears

UK carrier BT is at risk of a fine as it nears 31 December deadline to replace Huawei equipment from its core network.
BT Group is at risk of financial penalties from the UK government, as it looks set to miss the 31 December to replace equipment from Huawei Technologies in its core network.
This is according to Bloomberg, which reported that the UK carrier has said it hasn't completed work to replace Huawei Technologies equipment in its core network ahead of the UK government's December deadline.
That deadline had already been moved backwards, after the British government last year had sent legal notices to 35 UK telecoms network operators to officially enforce this deadline.
In October 2022 the UK government extended the deadline for UK operators to remove Huawei equipment from its core networks.
The UK government gave operators until 31 December 2023 to remove Huawei 5G kit from network cores, compared to an original target deadline of 28 January 2023.
It reportedly did so, after operators blamed delays caused by the Covid-19 lockdowns.
Now Bloomberg has reported that the extended December 2023 deadline also looks set to be missed.
However the end of 2027 deadline to completely eliminate all Huawei equipment from UK 5G networks remains unchanged.
The resulting financial repercussions could be severe, as Bloomberg reported that penalties may add up to £100,000 per day after 31 December.
According to Bloomberg, BT is still at work to transition millions of its customers over to another supplier ahead of the government deadline, a spokesman for the London-based phone carrier reportedly said, declining to comment on whether the business would meet the timetable.
It comes after the UK government, after many delays, had in July 2020 ordered all UK operators to remove equipment from 'high risk vendors' such as Huawei from Britain's 5G network by 2027, over national security concerns.
In order to satisfy this order, 4G equipment from Huawei also has to be removed.
That 'national security' ban came into force from 31st December 2020, after which UK operators had to stop procuring new equipment from high risk vendors.
Huawei has always denied it poses a national security risk.
In September and October of 2020, BT had announced it would to use equipment from Nokia and Ericsson to replace Huawei kit.


This Cyber News was published on www.silicon.co.uk. Publication date: Thu, 21 Dec 2023 11:13:05 +0000


Cyber News related to BT Risks Fine As Huawei Removal Deadline Nears

BT Misses Deadline For Huawei Equipment Removal - Carrier fails to completely meet UK government's year-end deadline, for removal of Huawei equipment from core network. The UK government's year-end deadline for BT to remove Huawei telecoms equipment from its core network has been missed. The ...
10 months ago Silicon.co.uk
BT Risks Fine As Huawei Removal Deadline Nears - UK carrier BT is at risk of a fine as it nears 31 December deadline to replace Huawei equipment from its core network. BT Group is at risk of financial penalties from the UK government, as it looks set to miss the 31 December to replace equipment ...
11 months ago Silicon.co.uk
WhatsApp Hit with €55 Million Fine for Privacy Violations - WhatsApp is facing an €55 million privacy-related fine from the European Union’s data protection authority for allegedly violating the region's data protection laws. ...
1 year ago Thehackernews.com
Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments - With increased connectivity and linguistic diversity comes a new set of cybersecurity risks. This article will delve into the unique cybersecurity challenges in multilingual environments, focusing on solutions and best practices to mitigate such ...
11 months ago Cyberdefensemagazine.com
CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
11 months ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
11 months ago
Protecting branch office environments from ransomware The Register - Sponsored Feature Ransomware gangs that steal and encrypt vital business data before extorting payment for its decryption and restoration are ramping up global attacks at an ever-increasing rate. Cyber security experts agree that ransomware now ...
8 months ago Go.theregister.com
How to Do a Risk Analysis Service in a Software Project - Software projects are vulnerable to countless attacks, from the leak of confidential data to exposure to computer viruses, so any development team must work on an effective risk analysis that exposes any vulnerabilities in the software product. A ...
11 months ago Feeds.dzone.com
Product showcase: Apiiro unifies AppSec and SSCS in a deep ASPM - With the rapidly evolving threat landscape and complexity of interconnected applications, identifying real, business-critical application risks is more challenging than ever. Application security teams need a better solution than their current siloed ...
11 months ago Helpnetsecurity.com
Avast confirms it tagged Google app as malware on Android phones - Czech cybersecurity company Avast confirmed that its antivirus SDK has been flagging a Google Android app as malware on Huawei, Vivo, and Honor smartphones since Saturday. On affected devices, users were warned to immediately uninstall the Google app ...
11 months ago Bleepingcomputer.com
Huawei, Vivo phones tag Google app as TrojanSMS-PA malware - Huawei, Honor, and Vivo smartphones and tablets are displaying strange 'Security threat' alerts urging the deletion of the Google app, warning that it is detected as the 'TrojanSMS-PA' malware. In what appears to be a false positive, these security ...
11 months ago Bleepingcomputer.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
10 months ago Techtarget.com
What Are the 6 Types of Risk Assessment and How Do They Work? - Risk assessment is a tool used to help quantify potential risks in a certain situation. It can be used in many different scenarios, including business operations, financial decisions, and also cybersecurity. A risk assessment helps you identify areas ...
1 year ago Thehackernews.com
€55 Million European Union Data Breach Fine for Meta Group AG - Meta Group AG recently received a massive fine of €55 million from the European Union for failing to secure its data and avoid a data breach. ...
1 year ago Securityweek.com
Northern Ireland police to Pay £750,000 fine Following Data Breach - The Police Service of Northern Ireland (PSNI) has been ordered to pay a £750,000 fine following a significant data breach last year. The UK’s Information Commissioner, John Edwards, labeled this incident “the worst data breach” his ...
1 month ago Gbhackers.com
US Supreme Court Leak Investigation Highlights Weak and Ineffective Risk Management Strategy - A recent US Supreme Court leak investigation has highlighted a number of weaknesses in the existing risk management strategy. The investigation has revealed that there were no controls in place to prevent the leak from taking place and the risk ...
1 year ago Csoonline.com
Enhancing Organisational Security: A Comprehensive Guide to Insider Risk Management Courses - In a world increasingly aware of internal security threats, the necessity for comprehensive insider risk management courses has never been more crucial. Astonishingly, up to 90% of organisations acknowledge their vulnerability to insider attacks, ...
10 months ago Securityboulevard.com
Protecting User Privacy by Removing Personal Data from Data Broker Sites - As part of its new subscription service model, Mozilla Firefox is offering its users the possibility of finding and removing their personal and sensitive information from data brokers across the internet. To eliminate their phone numbers, e-mail, ...
9 months ago Cysecurity.news
The Cyber Risks Of Using Unsecured Wi-Fi Networks And How To Avoid Them - In the hustle and bustle of our daily lives, public Wi-Fi has become a lifeline for many. Whether in coffee shops, airports, or local hangouts, the convenience of free Wi-Fi is undeniable. A recent study by NordVPN draws light on a concerning trend - ...
9 months ago Cysecurity.news
Cybersecurity Risk Management: Top 20 essential Long-Tail Keywords - Cybersecurity risk management is essential for protecting any organization from malicious actors on the internet. In the digital age, all businesses need to understand the risks and take steps to defend themselves from cyber threats. Cybersecurity ...
1 year ago Heimdalsecurity.com
Navigating Tech Risks in Modern M&A Waters - Executives operating in today's intricate business landscape must profoundly understand the multifaceted landscape of cyber, data, and technology risks. In the realm of M&A, the term "Cyber" encompasses far-reaching aspects, including fortifying ...
11 months ago Darkreading.com
Key elements for a successful cyber risk management strategy - In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel ...
10 months ago Helpnetsecurity.com
Balancing generative AI cybersecurity risks and rewards - CAMBRIDGE, MASS. - As AI tools and systems have proliferated across enterprises, organizations are increasingly questioning the value of these tools compared with the security risks they might pose. At the 2024 MIT Sloan CIO Symposium this week, ...
6 months ago Techtarget.com
The Imperative for Zero Trust in a Cloud-Native Environment - The security policy is dynamically updated with the changes of users, devices, data and external risks. Due to the dynamic, containerized and microservice characteristics of cloud-native environments, traditional boundary security protection policies ...
11 months ago Securityboulevard.com
Italian Data Protection Authority Fines WhatsApp €5.5 Million - The Italian Data Protection Authority (DPA) has fined WhatsApp €5.5 million as a result of violations of the European Union’s General Data Protection Regulation (GDPR). ...
1 year ago Securityaffairs.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)