Internet of Things
TOP 5 CHALLENGES FOR UK MANUFACTURING OT CYBERSECURITY…
AND HOW TO TACKLE THEM By Keiron Holyome, VP UKI & Emerging Markets, BlackBerry
connected technologies that drive performance optimisation and cost savings. It requires a delicate mix of the “new” integrated with your legacy devices, protocols and infrastructure. But how do you protect this mix against a surge of cyber-based attacks targeting operational technology (OT) environments? An infected USB, compromised laptop, or a demilitarised zone (DMZ) misconfiguration – whether malicious or non-malicious – can expose your facility, bringing your model of efficiency to a crashing halt. Now, more than ever, cyber risk equals business risk. During 2020, there was a 2,000 per cent rise in incidents targeting OT and industrial control systems. The 2022 IBM Security X-Force Threat Intelligence Index reported that manufacturing had become the world’s most attacked industry - outpacing finance and insurance for the first time in five years. Perhaps just as concerning, research by Make UK, the UK manufacturers' organisation, and BlackBerry revealed that when confronted by successful cyberattacks, 65 per cent of the UK’s manufacturers in the study experienced production stoppages.
Y 68
ou have done all you can to fine- tune your factory floor by maximising its dependability and its efficiency. Perhaps you have even taken steps toward Industry 4.0, a revolution defined by data- and internet-
“No business can afford to ignore this issue and failing to get this right could cost the manufacturing industry billions of pounds and put thousands of jobs at risk,” notes Stephen Phipson, CEO of Make UK. “While cost remains the main barrier to companies installing proper cyber protection, the need to increase the use of the latest technology makes mounting a proper defence against cyberthreats essential.” Findings from the joint report, Cybersecurity in UK Manufacturing, highlight the following top five concerns for achieving an operationally resilient organisation:
1. Maintaining legacy IT (44.6 per cent)
2. Limited cybersecurity skills within the business (37.5 per cent)
3. Providing access to third parties for remote monitoring and maintenance (33 per cent)
4. Understanding IT security versus OT security (26.8 per cent)
5. No single tool or sensor can provide visibility into all threats (25 per cent)
In answer to these pressing concerns, it is time for industry management to bring in the “big guns” of preventative cybersecurity to protect against vulnerabilities from insider breaches, hacktivists, cybercriminals, and nation-state actors that target the industrial IoT. It is time for the “self-defending” manufacturing floor.
Defining the idea of a self-defending factory floor requires some context. For starters, we know that far too many manufacturing environments are at least partially “un- patched” against known vulnerabilities and are therefore insecure and present soft targets for threat actors.
The antidote to this is a manufacturing floor that is equipped to detect and block the vast majority of cyberattacks before they can execute and disrupt your production. However, this must be done with lightweight security technology that will not interfere with other critical business systems, that works even on legacy equipment, and protects any air- gapped devices or systems that are rarely – if ever – connected.
This is why many manufacturers are now moving to cybersecurity powered by artificial intelligence (AI). It helps manufacturers maintain continuous operation, improves security, and delivers a proven ROI. Organisations with fully deployed cybersecurity
May 2023 Instrumentation Monthly
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82