• Latest
  • Trending
Five Cybersecurity Risks The Manufacturing Industry Faces

Five Cybersecurity Risks The Manufacturing Industry Faces

March 11, 2022
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 6 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Five Cybersecurity Risks The Manufacturing Industry Faces

by ITECHNEWS
March 11, 2022
in Leading Stories, Opinion
0 0
0
Five Cybersecurity Risks The Manufacturing Industry Faces

As society enters a fourth industrial revolution, the manufacturing industry is facing vast, rapid changes. Those changes are marked by both innovation, productivity and efficiency improvements, and new, unforeseen risks. Understanding the cybersecurity threats this industry faces will help those organizations identify their own key vulnerabilities and implement cybersecurity strategies to best protect their critical systems.

One only needs to look at the data to see that smart factories and other manufacturing organizations are at risk:

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

  • 63% of organizations don’t have visibility into the level of access and permissions their users have to critical systems.
  • 57% of manufacturers suffered a third-party related breach in the past year
    Manufacturing is now the second-most targeted industry for cyber attacks, with the largest average ransomware payout.

Four Factors That Put Manufacturing Organizations At Risk

Industrial control systems are targets for ransomware and malware.

It’s simple: high risk equals a high reward. The risk associated with industrial control systems being hacked or going down is extremely high, and it could result in monetary loss, supply chain issues, or even threaten public safety (in the case of critical infrastructure). So, bad actors know that if they hold those systems for ransom, the pay day could come fast and could be massive.

Third-party connections are increasing, which increases access point risk.

It’s well known by now that third parties are a major source of risk for any organization – and manufacturing plants, supply chain operations, and smart factories contain plenty. Just this past week, Toyota had to temporarily suspend domestic operations and lost 13,000 cars worth of output because of an attack on one of their suppliers. Third-party hacks are common, they’re increasing, and the fact is many organizations don’t have full visibility or control over those third parties.

Many organizations lack cybersecurity solutions, or have yet to prioritize them, instead relying on older systems that are less secure.

Factories are getting smarter, but their cybersecurity remains the same. Just as their software and operations are adaptive, their security needs to be adaptive as well, covering all critical access points and adjusting as needed to protect what’s most important. Updating to better remote access platforms, educating employees, and utilizing innovation is key to protecting critical access points and assets.

Many manufacturing organizations are part of “critical infrastructure” which is highly targeted by hackers.

Russian hackers targeted Colonial Pipeline, causing a shutdown of operations and a gas shortage across the Southeast coast of the United States. Bad attackers get into the operations technology of a water treatment plant in Oldsmar, Florida, almost succeeding in poisoning the water supply. These are just two examples of how a critical infrastructure hack can not only damage an organization, but threaten public health and public safety. Critical infrastructure is just that—critical–and it needs equally critical cybersecurity to keep it safe.

Those Risks Could Cause Catastrophic Damage

When it comes to a cyberattack on a smart factory, manufacturing organization, or a critical infrastructure entity, the risk goes far beyond operational downtime and reputational damage. These entities interact with multiple high-value third parties and often the general public, meaning one hack could have a devastating ripple effect. Just look at the Oldsmar plant, Colonial Pipeline, or others to see how fast a cyberattack could spiral into something more sinister.

Those effects could:

  • Cause OT downtime and loss of productivity and revenue
  • Create supply chain disruptions across a region
  • Result in IP theft and customer information theft, threatening industry strength and reputation
  • Involve costly ransomware payments
  • Threaten employee and public safety or cause environmental damage

The Solution Is Critical

As manufacturing moves towards smart factories, advanced technology, and globalization, organizations need a decentralized cybersecurity approach that fits their decentralized structure and operations. Critical Access Management, or the securing of critical access points, is the best solution to make sure every aspect of the manufacturing operation is safe. A manufacturing organization can be hacked from any access point, and with new technology coming into play, those access points grow exponentially while the assets behind them rise in value.

Cybersecurity measures all organization should take include:

  • Employing access governance to create robust access policies
  • Securing your third-party connections with third-party specific software
  • Removing broad network access and implement granular, defined access
  • Monitoring and auditing access to high-volume or mission critical access points, such as SCADA, MES, or other operational technologies
Source: Isa Jones
Via: Security Boulevard
Tags: Cybersecurity Risks
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version