TECHNOLOGY THREATS Ӏ SPECIAL REPORT
of remote service products. Its
Information Security Management System (ISMS) has ISO/IEC 27001 certification making it compliant, it says, with the best practices. In Konecranes’ words, ‘ISMS
demonstrates our commitment to proactively manage information security and ensure compliance with legal and customer requirements.’ Konecranes has also received
ISO/IEC 27001 certification for its global business applications and IT infrastructure. Konecranes Demag UK has Cyber Essential certification – a mandatory requirement for companies working with certain UK government contract types, including the Ministry of Defence, and other regulated industries. Again, to quote the company,
‘Konecranes monitors devices and networks and uses security information and event management (SIEM) to identify abnormal behaviour or potential cyberattacks. Konecranes has processes in place for vulnerability management, malware protection and information system audits. Information technology functions and IT suppliers also follow incident, problem, and change management processes to ensure the availability, stability and security of our IT environment.' Such procedures will no doubt
become standard in the industry, if they are not already.
MOBILE MACHINES Your machine does not have to be hard-mounted in a factory and hard-wired to the internet to be vulnerable. Mobile assets are just as open to cyberattack. Modern vehicles, whether
cars, commercial vehicles such as mobile cranes, or off-highway vehicles, resemble mobile data centres today. Their systems and components are networked with
42 CRANES TODAY
each other. This, of course, offers gateways to hackers and malware. And, curiously, the longer a
product has been on the market, the greater the risk of security gaps in its systems. Buy a new vehicle of a type that has been in production for years, and you can expect that any defects that once affected the design have been identified by the manufacturer and rectified. The reverse is true of cyber vulnerability: "The risk of cyber threats increases over the years," says Oliver Huppenbauer, global cybersecurity manager of cybersecurity specialist Marquardt. "Nobody knows today the threats that will arise for a product in five, 10 or 15 years.” So manufacturers and owners
cannot rest on their laurels; if their product is cybersafe safe today, it may not be in a few years’ time. Yet they will still be wanting, and needing, to protect the people who bought those products. Indeed, the Cyber Resilience
Act, passed by the EU Parliament in 2024, requires all industries to provide exactly that: to ensure the resilience of their products against cyber threats over their entire life cycle. Specifically for the automotive industry, the regulation UN/ECE-R 155 standardises transnational requirements without which vehicle manufacturers, among others, will not receive certification and approval for road
traffic in the EU. But how exactly can crane
makers futureproof their cranes? Marquardt believes it has the answer with its Digital Shield solution that it offers to manufacturers. The Digital Shield is a fully automated cloud service that uses a digital twin to continuously compare all software and hardware parts of Marquardt components for potential threats with national and international databases. If a new threat affects part of a product Marquardt carries out an assessment of possible risks and, if required, develops solutions as a countermeasure, for example by patching the software. To make this possible even years after product development, Marquardt archives all relevant data and the source code of a product in order to react quickly in the event of a threat. As a positive side effect, updates or further developments are still possible years after a product launch. For crane operators the
message is clear: cybersecurity must be a top priority. The adoption of advanced protective measures and adherence to robust security standards are essential steps in safeguarding operations. As technology evolves, so too must the strategies to protect against emerging threats, ensuring the resilience of crane operations now and in the future.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53