Realising 5G’s Untapped Potential: Why the Next Leap in Secure Connectivity Starts Now

  • Enterprise
  • Mobile communications

© 123RF

  • Written by Philippe Vallée
  • Type Insight
  • Published

As 6G discussions grow, many sectors still lack true 5G resilience. Unlocking 5G SA, secure network features and sovereign trust architectures is vital to protect today’s mission-critical services.

It is at this time of year that industry observers and analysts begin outlining the major technology trends for the year ahead, one question is already gaining momentum: “Are we ready for 6G?”

It is a relevant discussion, but it also highlights an important reality: many organisations are still in the process of fully harnessing the capabilities already available within 5G.

While headlines increasingly focus on future-generation networks, the core issue remains unchanged: the full potential of 5G has yet to be unlocked – particularly in sectors where secure, resilient communications are critical, such as public safety, government services, and national infrastructure.

Recent hijacking attempts and communication-layer attacks in parts of Asia illustrate this challenge clearly. As long as legacy 4G-based networks remain the foundation for essential services, adversaries will continue to exploit them.

The Productivity–Security Gap in Current Mobile Networks

Despite years of investment, many mobile operators still under-utilise the capabilities that 5G already brings to the table. Short-term cost pressures continue to push critical traffic back onto 4G, even when more secure and resilient options exist.

The numbers tell the story clearly.

Ofcom’s Connected Nations report shows that while 5G coverage is growing steadily across the UK, 4G remains the dominant technology for end-users, covering more than 99% of premises and accounting for 78% of all mobile data traffic. 

This pattern isn’t unique to the UK. Across Europe, several national regulators have reported similar trends, noting 5G’s most advanced features – low-latency modes, standalone cores, dedicated slices, and the possibility to conceal the user identity with a PQC ready mechanism – remain under-deployed.

In consumer markets, this may be a temporary inefficiency.

In mission-critical environments, it becomes a vulnerability.

© 123RF

Why Mission-Critical Communications Require True 5G Standalone

Emergency services, high ranks civil servants, defence organisations, first responders, and critical-infrastructure operators all rely on communications that must be trusted, immediate, and resilient.

This is precisely what 5G was built for. But part of the challenge is that much of what we call “5G” today is not true 5G at all. In fact, most operators are still running 5G in Non-Standalone (NSA) mode – a combination of 5G radios with a 4G core. While delivering faster speeds, it prevents the activation of the very capabilities that distinguish 5G from previous generations. Features such as network slicing (a network in the network), advanced 5G security, and edge computing simply cannot operate without a full 5G Standalone (SA) core. In practice, this means many of 5G’s most important benefits for mission-critical users aren’t just under-utilised, they’re technically unavailable until networks complete the shift to true SA architecture.

But unless these capabilities are fully implemented – not just available on paper – their benefits remain largely theoretical. Too many organisations are still connected through hybrid infrastructures where the weakest link determines the overall security posture.

It is also important to recognise that the case for 5G Standalone is not solely commercial. Mission-critical users may represent a small share of operator revenue, but the security capabilities unlocked by SA will benefit the entire ecosystem. By under-utilising 5G we are effectively denying ourselves the security architecture required to defend against modern threats. In a world where cyberthreat augmented by AI is growing exponentially, this is no longer a passive delay in technological progress; it is an active decision to tolerate avoidable vulnerability. 

A Pragmatic Path Forward: Strengthening Today’s 5G Networks

Instead of rushing headlong into the 6G conversation, we should first maximise the platform we already have. That begins with fully activating the advanced security features of 5G. Operators and governments need to accelerate the shift to standalone cores, secure control channels, and dedicated slices for mission-critical users so that 5G’s theoretical advantages become operational reality.

The second step is embedding trust at every layer of the network. Perimeter security alone is no longer enough; mission-critical 5G requires true end-to-end protection. This means securing data-in-motion and data-at-rest, protecting virtualised functions, ensuring device identity, and managing cryptographic keys through strong hardware-rooted trust, including HSMs. These are the often-invisible components that determine whether a network can be relied upon when it matters most.

Finally, we must build sovereign, interoperable ecosystems tailored for public-safety users – a capability Thales provides through our Key Management Server which integrates with 3rd party mission critical application servers. This is not future-tense innovation – it is available today, proving that resilience does not need to wait for 6G. 

Strengthening 5G today is the foundation for tomorrow’s innovation

Of course the potential and promise of 6G are exciting: integrated sensing, AI-native network management, unprecedented spectrum flexibility. But genuine progress begins with unlocking the full potential of 5G, especially for the sectors tasked with protecting citizens and national assets.

We do not need to wait until 2030 to build trusted, sovereign, resilient communications.

We can, and must, start now.

Related Articles

  • Enterprise

6G and the rise of intelligent networks

Insight
  • Enterprise

What the EU Cyber Resilience Act means for IoT

Insight
  • Enterprise

Bureau Veritas validates Thales assessment of Cloud OTA environmental impact

Insight
  • IoT & connectivity

The Quantum Clock is ticking - Securing eSIM device communications for the future

Insight
  • Enterprise

Will quantum computing attacks undermine the promise of AI-native telco networks?

Insight
  • Enterprise

How the SGP.32 standard enables the next generation of IoT management

Insight
man holding smartphone
  • Enterprise

eSIM at Scale: Unlocking Opportunities & Preparing for the Next Phase

Insight
  • Enterprise

5G, AI, and dedicated chipsets: the factors powering IoT's second wave

Insight
  • Enterprise

Why CES 2026 was a showcase for a new and more secure IoT

Insight

Receive the latest Cyber and Digital insights straight to your mailbox