There is a growing demand for faster and more reliable telecom services. This has, in turn, spurred demand for digital infrastructure such as data centres, submarine cables and next-generation networks in the country.

However, the surge in digital infrastructure has brought with it a variety of sophisticated cyberthreats. For instance, data centres are among the most targeted components of telecom infrastructure, as they house vital information for governments, businesses and individuals. Recent cyberattacks such as the ransomware breach at Uttarakhand’s disaster recovery centre in Bengaluru, which forced the shutdown of 192 government websites in the state, demonstrate how complex these threats can be. Attackers often exploit vulnerabilities in outdated systems, unpatched software or weak access controls to gain entry and move laterally across networks. Applications hosted on data centres containing in-house or third-party codes, and the adoption of remote access solutions (such as remote desktop protocol infrastructure) by enterprises are also being leveraged by attackers as access points to sensitive information. Additionally, data thefts for financial gain are being carried out through insider infiltration, exposing data centres to security compromises.

The damage to three submarine cables in the Red Sea, vital for India’s global telecommunications, illustrates that subsea cables are also vulnerable to cybersecurity breaches. In addition to physical damage, hacking, espionage and disruption are some of the other risks that subsea cables are vulnerable to. To complicate matters further, repairing subsea cables is not an easy task, since they are laid along the seabed. This is concerning, as subsea cables carry approximately 99 per cent of intercontinental communications and are crucial for several new generation networks, so any harm to them can have grave economic and social ramifications for India.

Several other modern technologies are susceptible to data breaches. For instance, while 5G promises faster speeds and improved connectivity, it is vulnerable to jamming attacks, interception of data traffic and international mobile subscriber identity-based tracking of users. Similarly, software-defined networking (SDN), which enhances network flexibility and efficiency, introduces new risks due to its programmable nature. Moreover, unauthorised access to SDN systems can expose sensitive data, creating further opportunities for exploitation. Meanwhile, edge computing nodes, often deployed at the periphery of networks, are vulnerable to unauthorised access and data manipulation due to their limited security measures. The widespread proliferation of internet of things devices, many of which lack strong security protocols, exacerbates this issue. Cybercriminals can exploit these vulnerabilities to launch distributed denial of service attacks to form botnets, steal sensitive data or disrupt operations across industries.

To effectively safeguard telecom infrastructure, providers must implement multi-layered security strategies that integrate advanced technologies and proactive threat management approaches. For example, zero trust architecture (ZTA) ensures that no user or device inside or outside a network is inherently trusted. Leveraging multi-factor authentication and micro-segmentation, ZTA minimises the risk of lateral movement within networks, ensuring that, in the event of a breach, attackers are confined to a limited area, thus reducing potential damage. This strengthens the network’s overall security by treating every interaction with caution and ensuring that only authorised entities have access to critical infrastructure.

Complementing ZTA, artificial intelligence (AI)-driven threat detection is crucial to enhancing a network’s responsiveness to emerging threats. By using AI and machine learning algorithms, telecom providers can analyse vast datasets in real time to identify unusual behaviours that might indicate potential cyber threats, and neutralise them. Furthermore, quantum-resistant encryption is emerging as an essential safeguard to protect sensitive data.

Further, blockchain applications can enhance transaction integrity, ensuring that data remains secure during transmission. Similarly, tokenisation can safeguard user data by converting it into secure tokens, reducing the risks associated with data breaches.

By combining these strategies, telecom providers can create a robust security framework that not only defends critical infrastructure but also supports the seamless functioning of emerging technologies that are essential for the digital economy.

Future outlook

As telecom infrastructure continues to evolve, the integration of emerging technologies will present new opportunities and challenges for cybersecurity. One of the most pressing issues on the horizon is the heightened cybersecurity challenges accompanying 6G. To address this, telecom providers are investing in AI-driven security measures to anticipate and detect threats before they materialise. Further, the advent of quantum computing threatens to render traditional cryptographic methods obsolete. To combat this, quantum cryptography is being developed as a secure means of transmitting data using the principles of quantum mechanics. Lastly, blockchain’s decentralised nature and its ability to provide transparent, tamper-proof records will be vital in verifying the authenticity of transactions and preventing cyber fraud. By integrating these technologies, telecom providers can build more resilient and secure infrastructures that will support the continued growth of the global digital economy.