Deployment of 5G has begun and the technology has a two-pronged effect – it can increase security and privacy protections for users and unlock tremendous potential across several verticals, but, at the same time, it can create vulnerabilities for businesses. In this new, hyper-connected environment, organizations must redefine their cyber strategy to ensure that they can benefit from the potential 5G offers while protecting themselves from future attacks. In this second article of a two-part series, we provide practical advice on how to do that and discuss the first volume of NIST’s 5G Security Practice Guide. Part one laid out the vulnerabilities and cybersecurity challenges 5G brings to the table. See “How to Address Intensifying Enterprise IoT Security Risks” (Oct. 14, 2020).