Telecom companies navigate evolving cybersecurity challenges

Cybersecurity MMBI industry snapshot

April 15, 2025
#
MMBI Telecommunications Cybersecurity

Telecommunications companies are facing a significant rise in cybersecurity issues driven by ever-evolving network consumption by businesses, firms and individuals. Continuous innovation further heightens the potential for attacks and the importance of developing and implementing cybersecurity protocols.

Telecom companies must strike a balance between security and innovation, understanding that critical vulnerabilities can leave network providers exposed to rising fines, regulatory challenges and operational concerns, says Nick Chitopoulos, a technology, media and telecommunications senior analyst at RSM US LLP.

Due to global tensions, state-sponsored cyberespionage from foreign adversaries has increased tremendously. Tariffs and trade wars have further escalated these issues, with the potential for increased cyberespionage during trade conflicts. Attackers often look for ways to access sensitive data and potentially disrupt communication networks. Telecom networks must be proactive to secure both network and physical infrastructure and future-proof their cybersecurity strategies.

“At least nine large telecommunication providers were attacked by Chinese hackers linked to the Salt Typhoon cyberespionage operation,” says Chitopoulos. “In addition, physical attacks to the global telecommunication network have increased across the globe, with damage of underwater transoceanic internet cable from boats that are linked to Russia and China.”

Customer data privacy is another crucial challenge for telecom companies that has grown substantially in the last three years. To prevent these sensitive data breaches, networks must comply with global regulations and adhere to increased scrutiny to avoid fines and legal consequences. Companies should focus on building customer trust to differentiate themselves, Chitopoulos says. 

At least nine large telecommunication providers were attacked by Chinese hackers linked to the Salt Typhoon cyberespionage operation. In addition, physical attacks to the global telecommunication network have increased across the globe, with damage of underwater transoceanic internet cable from boats that are linked to Russia and China.
Nick Chitopoulos, Senior Analyst, Technology, Media and Telecommunications, RSM US LLP

Beyond threats from hackers, natural disasters can have consequential effects on telecom networks, disrupting data centers and affecting connectivity, service and infrastructure. Telecom companies must be proactive in creating disaster relief plans and partnering with satellite companies to ensure network resilience during these stressful situations.

Artificial intelligence and automation can be pivotal tools in securing telecom networks.

“There is immense potential for AI to help companies address potential issues and disruptions that could lead to shutdowns, delays and loss of revenue,” Chitopoulos says. “These tools can detect threats, prevent fraud and optimize network loads to boost security.”

Meanwhile, as companies adapt to ongoing threats, the telecom industry is also experiencing an increase in cybersecurity regulations. These rules require annual tests to evaluate system integrity, and companies often must work with an independent auditor to assess compliance with the Federal Communications Commission’s cybersecurity rules and report findings to the agency.

The Broadband Equity, Access, and Deployment (BEAD) Program mandates that all projects comply with a cybersecurity risk management plan under the standards of Executive Order 14028 and have a cybersecurity supply chain risk management plan based on practices described in the National Institute of Standards and Technology Interagency Report 8276.

Though many telecom companies are still in the early stages of addressing potential cyberattacks, “they must be proactive in deploying cybersecurity strategies by having the right processes, plans and tools in place to handle any adversaries or data breaches,” Chitopoulos says. “Be diligent to put in place a cybersecurity strategy to mitigate risks.”

RSM US MMBI

Cybersecurity special report

Our annual insights into cybersecurity trends, strategies and concerns shape the marketplace for midsize businesses in an increasingly complex risk environment.

"